Update web-platform-tests to revision 8fd32a0f7c18d32ae9e147d267746accc3ee9ad5

This commit is contained in:
WPT Sync Bot 2020-05-30 08:20:29 +00:00
parent 1a61937031
commit 1c115a1737
133 changed files with 1771 additions and 599 deletions

View file

@ -4,7 +4,7 @@
expected: TIMEOUT expected: TIMEOUT
[Opening a blob URL in a new window immediately before revoking it works.] [Opening a blob URL in a new window immediately before revoking it works.]
expected: FAIL expected: TIMEOUT
[Fetching a blob URL immediately before revoking it works in an iframe.] [Fetching a blob URL immediately before revoking it works in an iframe.]
expected: FAIL expected: FAIL

View file

@ -1,4 +0,0 @@
[hit-test-floats-002.html]
[Hit test float]
expected: FAIL

View file

@ -0,0 +1,4 @@
[hit-test-floats-005.html]
[Miss clipped float]
expected: FAIL

View file

@ -17,3 +17,6 @@
[test the top of layer] [test the top of layer]
expected: FAIL expected: FAIL
[test some point of the element: top left corner]
expected: FAIL

View file

@ -1,4 +1,4 @@
[HTMLLinkElement-disabled-001.tentative.html] [HTMLLinkElement-disabled-001.html]
[<link disabled> prevents the stylesheet from being in document.styleSheets (from parser)] [<link disabled> prevents the stylesheet from being in document.styleSheets (from parser)]
expected: FAIL expected: FAIL

View file

@ -1,4 +1,4 @@
[HTMLLinkElement-disabled-002.tentative.html] [HTMLLinkElement-disabled-002.html]
[HTMLLinkElement.disabled reflects the <link disabled> attribute, and behaves consistently, when the sheet is an alternate] [HTMLLinkElement.disabled reflects the <link disabled> attribute, and behaves consistently, when the sheet is an alternate]
expected: FAIL expected: FAIL

View file

@ -1,4 +1,4 @@
[HTMLLinkElement-disabled-003.tentative.html] [HTMLLinkElement-disabled-003.html]
[HTMLLinkElement.disabled's explicitly enabled state persists when disconnected and connected again] [HTMLLinkElement.disabled's explicitly enabled state persists when disconnected and connected again]
expected: FAIL expected: FAIL

View file

@ -1,4 +1,4 @@
[HTMLLinkElement-disabled-004.tentative.html] [HTMLLinkElement-disabled-004.html]
[HTMLLinkElement.disabled's explicitly enabled state doesn't persist on clones] [HTMLLinkElement.disabled's explicitly enabled state doesn't persist on clones]
expected: FAIL expected: FAIL

View file

@ -1,4 +1,4 @@
[HTMLLinkElement-disabled-005.tentative.html] [HTMLLinkElement-disabled-005.html]
expected: TIMEOUT expected: TIMEOUT
[HTMLLinkElement.disabled's explicitly enabled state persists regardless of rel] [HTMLLinkElement.disabled's explicitly enabled state persists regardless of rel]
expected: TIMEOUT expected: TIMEOUT

View file

@ -1,4 +1,4 @@
[HTMLLinkElement-disabled-007.tentative.html] [HTMLLinkElement-disabled-007.html]
[HTMLLinkElement.disabled setter sets the explicitly enabled state if toggled back and forth.] [HTMLLinkElement.disabled setter sets the explicitly enabled state if toggled back and forth.]
expected: FAIL expected: FAIL

View file

@ -0,0 +1,2 @@
[HTMLLinkElement-disabled-alternate.html]
expected: FAIL

View file

@ -312,21 +312,18 @@
[Response: combined response Content-Type: text/html;" \\" text/plain ";charset=GBK] [Response: combined response Content-Type: text/html;" \\" text/plain ";charset=GBK]
expected: NOTRUN expected: NOTRUN
[<iframe>: combined response Content-Type: text/html;" \\" text/plain]
expected: FAIL
[<iframe>: separate response Content-Type: text/html;x=" text/plain]
expected: FAIL
[<iframe>: separate response Content-Type: text/html;" \\" text/plain] [<iframe>: separate response Content-Type: text/html;" \\" text/plain]
expected: FAIL expected: FAIL
[<iframe>: combined response Content-Type: */* text/html]
expected: FAIL
[<iframe>: separate response Content-Type: text/html;" text/plain] [<iframe>: separate response Content-Type: text/html;" text/plain]
expected: FAIL expected: FAIL
[<iframe>: separate response Content-Type: text/html */*] [<iframe>: combined response Content-Type: text/html;" text/plain]
expected: FAIL
[<iframe>: separate response Content-Type: text/html */*;charset=gbk]
expected: FAIL
[<iframe>: combined response Content-Type: text/html;x=" text/plain]
expected: FAIL expected: FAIL

View file

@ -59,6 +59,3 @@
[separate text/javascript;charset=windows-1252 error text/javascript] [separate text/javascript;charset=windows-1252 error text/javascript]
expected: FAIL expected: FAIL
[separate text/javascript error]
expected: FAIL

View file

@ -1,4 +1,4 @@
[traverse_the_history_4.html] [traverse_the_history_2.html]
[Multiple history traversals, last would be aborted] [Multiple history traversals, last would be aborted]
expected: FAIL expected: FAIL

View file

@ -1,4 +1,4 @@
[traverse_the_history_4.html] [traverse_the_history_3.html]
[Multiple history traversals, last would be aborted] [Multiple history traversals, last would be aborted]
expected: FAIL expected: FAIL

View file

@ -0,0 +1,2 @@
[cross-origin-objects-on-new-window.html]
expected: TIMEOUT

View file

@ -1,8 +1,7 @@
[embedded-opener-remove-frame.html] [embedded-opener-remove-frame.html]
expected: CRASH
[opener of discarded nested browsing context] [opener of discarded nested browsing context]
expected: FAIL expected: FAIL
[opener of discarded auxiliary browsing context] [opener of discarded auxiliary browsing context]
expected: TIMEOUT expected: FAIL

View file

@ -1294,9 +1294,6 @@
[Window interface: window must inherit property "onwebkitanimationiteration" with the proper type] [Window interface: window must inherit property "onwebkitanimationiteration" with the proper type]
expected: FAIL expected: FAIL
[Document interface: new Document() must inherit property "queryCommandSupported(DOMString)" with the proper type]
expected: FAIL
[Window interface: attribute onsecuritypolicyviolation] [Window interface: attribute onsecuritypolicyviolation]
expected: FAIL expected: FAIL
@ -1315,9 +1312,6 @@
[Document interface: new Document() must inherit property "onwebkitanimationiteration" with the proper type] [Document interface: new Document() must inherit property "onwebkitanimationiteration" with the proper type]
expected: FAIL expected: FAIL
[Document interface: calling queryCommandSupported(DOMString) on documentWithHandlers with too few arguments must throw TypeError]
expected: FAIL
[Document interface: attribute designMode] [Document interface: attribute designMode]
expected: FAIL expected: FAIL
@ -1363,9 +1357,6 @@
[Window interface: existence and properties of interface prototype object] [Window interface: existence and properties of interface prototype object]
expected: FAIL expected: FAIL
[Document interface: calling queryCommandSupported(DOMString) on new Document() with too few arguments must throw TypeError]
expected: FAIL
[Window interface: operation focus()] [Window interface: operation focus()]
expected: FAIL expected: FAIL
@ -1408,9 +1399,6 @@
[Document interface: iframe.contentDocument must inherit property "onwebkitanimationiteration" with the proper type] [Document interface: iframe.contentDocument must inherit property "onwebkitanimationiteration" with the proper type]
expected: FAIL expected: FAIL
[Document interface: operation queryCommandSupported(DOMString)]
expected: FAIL
[Document interface: attribute onwebkittransitionend] [Document interface: attribute onwebkittransitionend]
expected: FAIL expected: FAIL
@ -1504,9 +1492,6 @@
[Window interface: window must inherit property "blur()" with the proper type] [Window interface: window must inherit property "blur()" with the proper type]
expected: FAIL expected: FAIL
[Document interface: iframe.contentDocument must inherit property "queryCommandSupported(DOMString)" with the proper type]
expected: FAIL
[Document interface: operation execCommand(DOMString, optional boolean, optional DOMString)] [Document interface: operation execCommand(DOMString, optional boolean, optional DOMString)]
expected: FAIL expected: FAIL
@ -1534,9 +1519,6 @@
[Document interface: iframe.contentDocument must inherit property "queryCommandEnabled(DOMString)" with the proper type] [Document interface: iframe.contentDocument must inherit property "queryCommandEnabled(DOMString)" with the proper type]
expected: FAIL expected: FAIL
[Document interface: calling queryCommandSupported(DOMString) on iframe.contentDocument with too few arguments must throw TypeError]
expected: FAIL
[Window interface: operation blur()] [Window interface: operation blur()]
expected: FAIL expected: FAIL
@ -1615,9 +1597,6 @@
[Document interface: iframe.contentDocument must inherit property "onsecuritypolicyviolation" with the proper type] [Document interface: iframe.contentDocument must inherit property "onsecuritypolicyviolation" with the proper type]
expected: FAIL expected: FAIL
[Document interface: documentWithHandlers must inherit property "queryCommandSupported(DOMString)" with the proper type]
expected: FAIL
[Document interface: new Document() must inherit property "queryCommandValue(DOMString)" with the proper type] [Document interface: new Document() must inherit property "queryCommandValue(DOMString)" with the proper type]
expected: FAIL expected: FAIL
@ -2499,9 +2478,6 @@
[HTMLInputElement interface: createInput("radio") must inherit property "height" with the proper type] [HTMLInputElement interface: createInput("radio") must inherit property "height" with the proper type]
expected: FAIL expected: FAIL
[HTMLImageElement interface: document.createElement("img") must inherit property "referrerPolicy" with the proper type]
expected: FAIL
[HTMLTableElement interface: document.createElement("table") must inherit property "align" with the proper type] [HTMLTableElement interface: document.createElement("table") must inherit property "align" with the proper type]
expected: FAIL expected: FAIL
@ -2850,9 +2826,6 @@
[HTMLLinkElement interface: document.createElement("link") must inherit property "imageSizes" with the proper type] [HTMLLinkElement interface: document.createElement("link") must inherit property "imageSizes" with the proper type]
expected: FAIL expected: FAIL
[HTMLImageElement interface: attribute referrerPolicy]
expected: FAIL
[HTMLInputElement interface: createInput("time") must inherit property "align" with the proper type] [HTMLInputElement interface: createInput("time") must inherit property "align" with the proper type]
expected: FAIL expected: FAIL
@ -3063,9 +3036,6 @@
[HTMLObjectElement interface: attribute width] [HTMLObjectElement interface: attribute width]
expected: FAIL expected: FAIL
[HTMLImageElement interface: new Image() must inherit property "referrerPolicy" with the proper type]
expected: FAIL
[HTMLInputElement interface: createInput("reset") must inherit property "useMap" with the proper type] [HTMLInputElement interface: createInput("reset") must inherit property "useMap" with the proper type]
expected: FAIL expected: FAIL
@ -3495,3 +3465,9 @@
[HTMLSlotElement interface: operation assignedNodes(optional AssignedNodesOptions)] [HTMLSlotElement interface: operation assignedNodes(optional AssignedNodesOptions)]
expected: FAIL expected: FAIL
[HTMLLinkElement interface: document.createElement("link") must inherit property "disabled" with the proper type]
expected: FAIL
[HTMLLinkElement interface: attribute disabled]
expected: FAIL

View file

@ -0,0 +1,5 @@
[window-domain-failure.https.sub.html]
expected: TIMEOUT
[SharedArrayBuffer and a same-origin-domain (but not same-origin) iframe]
expected: TIMEOUT

View file

@ -0,0 +1,13 @@
[window-iframe-messagechannel.https.html]
[postMessaging with a MessageChannel that's been cross-site should succeed]
expected: FAIL
[postMessaging to a same-site iframe via MessageChannel should fail]
expected: FAIL
[postMessaging to a cross-site iframe via MessageChannel should fail]
expected: FAIL
[postMessaging to a same-origin iframe via MessageChannel allows them to see each others' modifications]
expected: FAIL

View file

@ -14,6 +14,3 @@
[Host element with delegatesFocus should support autofocus] [Host element with delegatesFocus should support autofocus]
expected: FAIL expected: FAIL
[Non-HTMLElement should not support autofocus]
expected: FAIL

View file

@ -1,5 +1,5 @@
[iframe_sandbox_popups_escaping-2.html] [iframe_sandbox_popups_escaping-2.html]
expected: TIMEOUT expected: CRASH
[Check that popups from a sandboxed iframe escape the sandbox if\n allow-popups-to-escape-sandbox is used] [Check that popups from a sandboxed iframe escape the sandbox if\n allow-popups-to-escape-sandbox is used]
expected: TIMEOUT expected: TIMEOUT

View file

@ -1,4 +1,5 @@
[iframe_sandbox_popups_nonescaping-1.html] [iframe_sandbox_popups_nonescaping-1.html]
expected: TIMEOUT
[Check that popups from a sandboxed iframe do not escape the sandbox] [Check that popups from a sandboxed iframe do not escape the sandbox]
expected: FAIL expected: NOTRUN

View file

@ -1,5 +1,5 @@
[iframe_sandbox_popups_nonescaping-2.html] [iframe_sandbox_popups_nonescaping-2.html]
expected: CRASH expected: TIMEOUT
[Check that popups from a sandboxed iframe do not escape the sandbox] [Check that popups from a sandboxed iframe do not escape the sandbox]
expected: NOTRUN expected: NOTRUN

View file

@ -0,0 +1,4 @@
[form-double-submit-3.html]
[<button> should have the same double-submit protection as <input type=submit>]
expected: FAIL

View file

@ -3,3 +3,6 @@
[The incumbent settings object while executing the compiled callback via Web IDL's invoke must be that of the node document] [The incumbent settings object while executing the compiled callback via Web IDL's invoke must be that of the node document]
expected: TIMEOUT expected: TIMEOUT
[The entry settings object while executing the compiled callback via Web IDL's invoke must be that of the node document]
expected: FAIL

View file

@ -1,10 +1,9 @@
[promise-job-entry.html] [promise-job-entry.html]
expected: TIMEOUT
[Fulfillment handler on fulfilled promise] [Fulfillment handler on fulfilled promise]
expected: FAIL expected: FAIL
[Rejection handler on pending-then-rejected promise] [Rejection handler on pending-then-rejected promise]
expected: TIMEOUT expected: FAIL
[Sanity check: this all works as expected with no promises involved] [Sanity check: this all works as expected with no promises involved]
expected: FAIL expected: FAIL
@ -16,5 +15,5 @@
expected: FAIL expected: FAIL
[Fulfillment handler on pending-then-fulfilled promise] [Fulfillment handler on pending-then-fulfilled promise]
expected: TIMEOUT expected: FAIL

View file

@ -1,5 +0,0 @@
[017.html]
expected: TIMEOUT
[origin of the script that invoked the method, about:blank]
expected: TIMEOUT

View file

@ -0,0 +1,10 @@
[ar_anchor_states.https.html]
[Anchor creation fails if the feature was not requested]
expected: FAIL
[Anchor creation fails if the feature was requested but the session already ended]
expected: FAIL
[Anchor creation succeeds if the feature was requested]
expected: FAIL

View file

@ -7,7 +7,7 @@
expected: FAIL expected: FAIL
[Opening a blob URL in a new window immediately before revoking it works.] [Opening a blob URL in a new window immediately before revoking it works.]
expected: FAIL expected: TIMEOUT
[Opening a blob URL in a noopener about:blank window immediately before revoking it works.] [Opening a blob URL in a noopener about:blank window immediately before revoking it works.]
expected: TIMEOUT expected: TIMEOUT

View file

@ -122849,6 +122849,32 @@
{} {}
] ]
], ],
"inset-box-shadow-scroll.html": [
"7eca4ea544ff76740e13490fb995dfda5705336d",
[
null,
[
[
"/css/css-backgrounds/inset-box-shadow-scroll-ref.html",
"=="
]
],
{}
]
],
"inset-box-shadow-stacking-context-scroll.html": [
"edd79b88be2a71fc6054e7e866c8cabe03948a89",
[
null,
[
[
"/css/css-backgrounds/inset-box-shadow-scroll-ref.html",
"=="
]
],
{}
]
],
"scroll-positioned-multiple-background-images.html": [ "scroll-positioned-multiple-background-images.html": [
"a9ca550ce3dea2626de05bf31437a0a19aeedbce", "a9ca550ce3dea2626de05bf31437a0a19aeedbce",
[ [
@ -165743,6 +165769,19 @@
{} {}
] ]
], ],
"absolute-tables-007.html": [
"7922da49224c666156ff20765301b490ef91eafd",
[
null,
[
[
"/css/reference/ref-filled-green-100px-square.xht",
"=="
]
],
{}
]
],
"anonymous-table-cell-margin-collapsing.html": [ "anonymous-table-cell-margin-collapsing.html": [
"23b467ebacc983122a632f4d5971c8daca569420", "23b467ebacc983122a632f4d5971c8daca569420",
[ [
@ -206304,8 +206343,8 @@
] ]
}, },
"cssom": { "cssom": {
"HTMLLinkElement-disabled-alternate.tentative.html": [ "HTMLLinkElement-disabled-alternate.html": [
"5b020a172b175ac21d76052cfd44139d376f6605", "f1457c0dcf04d27a52a29fc860e94e81d432e5af",
[ [
null, null,
[ [
@ -206646,6 +206685,19 @@
{} {}
] ]
], ],
"backdrop-filter-opacity-rounded-clip.html": [
"88fed5742034734f539d965d99ffa20c16428282",
[
null,
[
[
"/css/filter-effects/backdrop-filter-opacity-rounded-clip-ref.html",
"=="
]
],
{}
]
],
"backdrop-filter-paint-order.html": [ "backdrop-filter-paint-order.html": [
"88531532fc33296e8c8eca5452da04d5d612662d", "88531532fc33296e8c8eca5452da04d5d612662d",
[ [
@ -246607,7 +246659,7 @@
[] []
], ],
"user-activation.js": [ "user-activation.js": [
"babd5b2cd32131a65d3eb81c4f5508fefff064cb", "ed294bb9cb27b552f23061118fcd260dc6b86a8f",
[] []
] ]
} }
@ -268229,7 +268281,7 @@
}, },
"resources": { "resources": {
"cookie-helper.sub.js": [ "cookie-helper.sub.js": [
"fcc1addf2954292037cf77b211bf37920a921e23", "1a163332e3c1821e690e1659842cd30202440f06",
[] []
], ],
"drop.py": [ "drop.py": [
@ -268315,6 +268367,10 @@
"1dceb4e43681c81b6c1b8877fd2d9f2b34391a02", "1dceb4e43681c81b6c1b8877fd2d9f2b34391a02",
[] []
], ],
"iframe.document.html": [
"7026beb7e816d7079c1d1625227cabf4d329b7ee",
[]
],
"navigate.html": [ "navigate.html": [
"7d0f87d49439088dc78883e85cfc5c6bcc291d4e", "7d0f87d49439088dc78883e85cfc5c6bcc291d4e",
[] []
@ -287012,6 +287068,10 @@
"10324966edb042c1c7298ce22dad76766c2a777b", "10324966edb042c1c7298ce22dad76766c2a777b",
[] []
], ],
"inset-box-shadow-scroll-ref.html": [
"55be941bfc35e8d064e811335242fd06dc28da67",
[]
],
"justfortest.html": [ "justfortest.html": [
"e69de29bb2d1d6434b8b29ae775ad8c2e48c5391", "e69de29bb2d1d6434b8b29ae775ad8c2e48c5391",
[] []
@ -311812,6 +311872,10 @@
"0453d7f2feda3367e0f7536d91b0b159d627dd5d", "0453d7f2feda3367e0f7536d91b0b159d627dd5d",
[] []
], ],
"backdrop-filter-opacity-rounded-clip-ref.html": [
"79177d1238730466d6e5b1a2b5354ee1a1e00db1",
[]
],
"backdrop-filter-paint-order-ref.html": [ "backdrop-filter-paint-order-ref.html": [
"bd82e520f0e70b75e45c687cb46f957a579e2358", "bd82e520f0e70b75e45c687cb46f957a579e2358",
[] []
@ -328793,6 +328857,14 @@
"6604450991a122e3e241e40b1b9e0516c525389d", "6604450991a122e3e241e40b1b9e0516c525389d",
[] []
], ],
"iframe-domain-failure.sub.html": [
"cf795c23805889f6e036873264444b631862d204",
[]
],
"iframe-domain-failure.sub.html.headers": [
"56d0ac342824434c621fb50f9351e2e74aa077cb",
[]
],
"iframe-failure.html": [ "iframe-failure.html": [
"2c33dba79a2fb9e6a81fc9ee5805b378e826f725", "2c33dba79a2fb9e6a81fc9ee5805b378e826f725",
[] []
@ -328817,11 +328889,11 @@
"4e798cd9f5d3f756df077a43ce9a1a6f9b41fd28", "4e798cd9f5d3f756df077a43ce9a1a6f9b41fd28",
[] []
], ],
"incrementer-iframe-domain.sub.html": [ "iframe-messagechannel-site-failure.html": [
"a6dd70177584c9115c24beb281e7681110c07624", "95a610f928584b89a5d9fb3a711337db21f839e9",
[] []
], ],
"incrementer-iframe-domain.sub.html.headers": [ "iframe-messagechannel-site-failure.html.headers": [
"56d0ac342824434c621fb50f9351e2e74aa077cb", "56d0ac342824434c621fb50f9351e2e74aa077cb",
[] []
], ],
@ -328934,7 +329006,7 @@
"63b60e490f47f4db77d33d7a4ca2f5b9a4181de8", "63b60e490f47f4db77d33d7a4ca2f5b9a4181de8",
[] []
], ],
"window-domain-success.https.sub.html.headers": [ "window-domain-failure.https.sub.html.headers": [
"63b60e490f47f4db77d33d7a4ca2f5b9a4181de8", "63b60e490f47f4db77d33d7a4ca2f5b9a4181de8",
[] []
], ],
@ -328958,10 +329030,6 @@
"63b60e490f47f4db77d33d7a4ca2f5b9a4181de8", "63b60e490f47f4db77d33d7a4ca2f5b9a4181de8",
[] []
], ],
"window-similar-but-cross-origin-success.https.sub.html.headers": [
"63b60e490f47f4db77d33d7a4ca2f5b9a4181de8",
[]
],
"window-simple-success.https.html.headers": [ "window-simple-success.https.html.headers": [
"63b60e490f47f4db77d33d7a4ca2f5b9a4181de8", "63b60e490f47f4db77d33d7a4ca2f5b9a4181de8",
[] []
@ -333006,7 +333074,7 @@
[] []
], ],
"structured-clone-battery-of-tests.js": [ "structured-clone-battery-of-tests.js": [
"751a0e1a9ea8b549543f2e78551b0d00b4fc6127", "0c96ded2088357e0d581587f4a1a66c74c9198b6",
[] []
] ]
}, },
@ -333908,7 +333976,7 @@
}, },
"interfaces": { "interfaces": {
"BackgroundSync.idl": [ "BackgroundSync.idl": [
"f84faf7bcd3bf1e836136bfbe34b6ba68f2bd25c", "c52dcdb89843e80e9bd89591df76ba26f7172dab",
[] []
], ],
"CSP.idl": [ "CSP.idl": [
@ -333999,6 +334067,10 @@
"fe77a2f942827c5fbb842db74556d5e8353a9cb3", "fe77a2f942827c5fbb842db74556d5e8353a9cb3",
[] []
], ],
"compression.idl": [
"47d2b9e48d06ae830ade5aef4b1c0914995a5e1f",
[]
],
"console.idl": [ "console.idl": [
"3cd3c06b54b022c61857a6a29e8e97bf4fa9b47b", "3cd3c06b54b022c61857a6a29e8e97bf4fa9b47b",
[] []
@ -334159,6 +334231,10 @@
"ada6c0c302cdff87a78a0e8ec5ac25a8f0e64922", "ada6c0c302cdff87a78a0e8ec5ac25a8f0e64922",
[] []
], ],
"get-installed-related-apps.idl": [
"cbea101d300f0082d7d020809c9c2da3e581ad90",
[]
],
"gyroscope.idl": [ "gyroscope.idl": [
"3754fd81e6bf605a308794e5b759ecd8784a6a15", "3754fd81e6bf605a308794e5b759ecd8784a6a15",
[] []
@ -334176,7 +334252,7 @@
[] []
], ],
"html.idl": [ "html.idl": [
"7b2a96ce6760a05b49e9c445b4050a991acd342b", "09e1a29043b5bb56b3366d2cbb13b5e834424121",
[] []
], ],
"image-capture.idl": [ "image-capture.idl": [
@ -334745,7 +334821,7 @@
] ]
}, },
"lint.ignore": [ "lint.ignore": [
"776c6332900bdd6bacade294131ce1ba028c7d1b", "078a706f079c3cfc2a88dbd8ce9b3b290d1ffcfb",
[] []
], ],
"loading": { "loading": {
@ -339504,6 +339580,14 @@
"ce2b968391343339a9958100f564fa73d5c01509", "ce2b968391343339a9958100f564fa73d5c01509",
[] []
], ],
"mock-screenenumeration.js": [
"0f71db8f5062a3ff0344d7999d65ddd5271a04fc",
[]
],
"mock-screenenumeration.js.header": [
"6805c323df5a975231648b830e33ce183c3cbbd3",
[]
],
"mock-sms-receiver.js": [ "mock-sms-receiver.js": [
"c4aa9a86f2c8a15303f96cc9859b2ec146eb2f58", "c4aa9a86f2c8a15303f96cc9859b2ec146eb2f58",
[] []
@ -339589,7 +339673,7 @@
[] []
], ],
"webxr-test-math-helper.js": [ "webxr-test-math-helper.js": [
"14e163712670f1dd5f081d0189bfe719bbd08bd6", "22c6c12d08fe1a739857bec0da88e89c8abffc60",
[] []
], ],
"webxr-test-math-helper.js.headers": [ "webxr-test-math-helper.js.headers": [
@ -339597,7 +339681,7 @@
[] []
], ],
"webxr-test.js": [ "webxr-test.js": [
"4809ac86bd3e487aceefbfb62ccd191e6395d70a", "adbb42eed8b70bef4c2786344fc24d90faf47bb8",
[] []
], ],
"webxr-test.js.headers": [ "webxr-test.js.headers": [
@ -340124,6 +340208,18 @@
[] []
] ]
}, },
"screen_enumeration": {
"README.md": [
"04b2ecce7c274f03fd5b0dbebecf82882f009902",
[]
],
"resources": {
"screenenumeration-helpers.js": [
"d96fca74b5d4520103f459120881b2aa03994a54",
[]
]
}
},
"scroll-animations": { "scroll-animations": {
"META.yml": [ "META.yml": [
"c53f1f432fe1ec2887e30af396a1f1574b76b95d", "c53f1f432fe1ec2887e30af396a1f1574b76b95d",
@ -344821,11 +344917,11 @@
] ]
}, },
"commands.json": [ "commands.json": [
"044322eed3baf467c6d809fc26ac958598942311", "d4e3ce8128002b8f83f33dc4a21852afd908e724",
[] []
], ],
"quic_transport_server.py": [ "quic_transport_server.py": [
"9a04ad17f195c6e5d233e84a9b23904cccfeccd6", "deef46fb8a74c8ff41c0b5e8d229ab7a34d19c10",
[] []
], ],
"requirements.txt": [ "requirements.txt": [
@ -344833,7 +344929,7 @@
[] []
], ],
"serve.py": [ "serve.py": [
"9893f25e27bdb3afd4bf39921e96abdcc4233f9d", "517b4c34b93ed4293c43f30a2baec8b920197d27",
[] []
] ]
}, },
@ -344935,7 +345031,7 @@
[] []
], ],
"serve.py": [ "serve.py": [
"43ff7bd0dfbac5eae74cbe43235f016c4fe14d35", "d98c81eafbb86585ecac5b7047a40d874eb54fe7",
[] []
], ],
"test_functional.py": [ "test_functional.py": [
@ -350418,7 +350514,7 @@
[] []
], ],
"environment.py": [ "environment.py": [
"f76836ea66b59bb16f2d3792451bcf28ecb2fb44", "1236d1f9bc291f590f74236cf2ad01d84d4785df",
[] []
], ],
"executors": { "executors": {
@ -351073,6 +351169,10 @@
"869d3d4604409411984cb49fcd40eb7e971b3c52", "869d3d4604409411984cb49fcd40eb7e971b3c52",
[] []
], ],
"test_response.py": [
"f8048ac1ce5529a600df1da4db9dfb4154f202c9",
[]
],
"test_stash.py": [ "test_stash.py": [
"31af1558b0cc5c046843e0e96569db42c467cf22", "31af1558b0cc5c046843e0e96569db42c467cf22",
[] []
@ -351112,7 +351212,7 @@
[] []
], ],
"response.py": [ "response.py": [
"b6f274474519846d298a29da0b3db3961999b24f", "b24f0cdf476850a10cdbe94bb857fc61ce32bcf8",
[] []
], ],
"router.py": [ "router.py": [
@ -355959,7 +356059,7 @@
[] []
], ],
"webxr_test_constants.js": [ "webxr_test_constants.js": [
"3ae294c015a73fc193ce68c0f80aec4111c3302c", "139ab775684c427e39bc50719226c96fcbd3a5d5",
[] []
], ],
"webxr_test_constants_fake_world.js": [ "webxr_test_constants_fake_world.js": [
@ -375181,6 +375281,39 @@
"timeout": "long" "timeout": "long"
} }
] ]
],
"idlharness.https.any.js": [
"c439d5b51910ba570c2b0273fc813e7e51c02c4d",
[
"compression/idlharness.https.any.html",
{
"script_metadata": [
[
"script",
"/resources/WebIDLParser.js"
],
[
"script",
"/resources/idlharness.js"
]
]
}
],
[
"compression/idlharness.https.any.worker.html",
{
"script_metadata": [
[
"script",
"/resources/WebIDLParser.js"
],
[
"script",
"/resources/idlharness.js"
]
]
}
]
] ]
}, },
"console": { "console": {
@ -380021,7 +380154,7 @@
] ]
], ],
"fetch.https.html": [ "fetch.https.html": [
"4daf357004a71cea5b0e58a44bf8919d96ad7ce8", "89050e03afd7f5aab3288be468f2dbf9712cc71d",
[ [
null, null,
{ {
@ -380036,7 +380169,7 @@
] ]
], ],
"form-get-blank-reload.https.html": [ "form-get-blank-reload.https.html": [
"026254549729cd4b5acc1f0c59833c55aa4e56e2", "611255f7374dae54994a2c3b20687765969d708f",
[ [
null, null,
{} {}
@ -380047,7 +380180,7 @@
] ]
], ],
"form-get-blank.https.html": [ "form-get-blank.https.html": [
"61af99967292abe8249f81d9fcd098c1f51273d7", "6fe28c21cc0c3a5912ef3f69e751ba7e936a15c0",
[ [
null, null,
{ {
@ -380062,7 +380195,7 @@
] ]
], ],
"form-post-blank-reload.https.html": [ "form-post-blank-reload.https.html": [
"69f720efc5bb129b08beaafeb9bdae2c00239cd2", "fedb0a03c5a9a69d64d0f372855f1f512d1a9a2f",
[ [
null, null,
{} {}
@ -380073,7 +380206,7 @@
] ]
], ],
"form-post-blank.https.html": [ "form-post-blank.https.html": [
"4ffd522b322e158baf7d1877aa5485dc010159b1", "d3cd369ca67a86bcd25c4f5a901e669beb77446c",
[ [
null, null,
{ {
@ -380088,7 +380221,7 @@
] ]
], ],
"iframe-reload.https.html": [ "iframe-reload.https.html": [
"9bfbdfd64186848df1b7b7165b5799d54c7dc8f7", "a33c4dd4eb2ac9aa22ee6c45157d6f1cfb48675a",
[ [
null, null,
{ {
@ -380102,8 +380235,17 @@
} }
] ]
], ],
"iframe.document.html": [
"2d276dbcaa9ce740ffdd8c8516defe18ab51de95",
[
null,
{
"timeout": "long"
}
]
],
"iframe.https.html": [ "iframe.https.html": [
"446b8c50c004a5c6599b73052ba870dac4aa70a9", "04ebb95836d7b4700e93eedb7ef0a07b943ec3fa",
[ [
null, null,
{ {
@ -380173,7 +380315,7 @@
] ]
], ],
"window-open-reload.https.html": [ "window-open-reload.https.html": [
"ee2091b1373a1da7068722c2557332e3a7f60b05", "f21b6a77de5c5bac6cc19195f098995b21deb3b5",
[ [
null, null,
{} {}
@ -380184,7 +380326,7 @@
] ]
], ],
"window-open.https.html": [ "window-open.https.html": [
"d685eb47fd07872116caa22d2b8ca23774f26a81", "7ee3ef43abea9bd86c4989b304846a7395d9d447",
[ [
null, null,
{ {
@ -394330,21 +394472,21 @@
"aspect-ratio": { "aspect-ratio": {
"parsing": { "parsing": {
"contain-intrinsic-size-computed.html": [ "contain-intrinsic-size-computed.html": [
"bf56adb9fe136d5e73c4dd5caec2cb4040b75115", "76fb5842ae691de4025795bc80777a61ceebbb6e",
[ [
null, null,
{} {}
] ]
], ],
"contain-intrinsic-size-invalid.html": [ "contain-intrinsic-size-invalid.html": [
"20378ab8cfe4f346d841a9a59e579a90b8147515", "e13c3ad07e1c25777cc9533407c0e57f6c6e5ddb",
[ [
null, null,
{} {}
] ]
], ],
"contain-intrinsic-size-valid.html": [ "contain-intrinsic-size-valid.html": [
"96b3ca59acc8af8c292fdaf2cc255475e7929d1f", "c7add59d1e408ad7f7aee459da49f9f072de845f",
[ [
null, null,
{} {}
@ -403010,50 +403152,50 @@
{} {}
] ]
], ],
"HTMLLinkElement-disabled-001.tentative.html": [ "HTMLLinkElement-disabled-001.html": [
"877356f924de995aca09579739c6120af2caab1e", "f2c5d0a545939b78e5833c19e83de660dd845ea2",
[ [
null, null,
{} {}
] ]
], ],
"HTMLLinkElement-disabled-002.tentative.html": [ "HTMLLinkElement-disabled-002.html": [
"9c46f60a6214538168b48cd06b16fda0ce52ec63", "34bd8182fef40b0b596661437f7840735f83c517",
[ [
null, null,
{} {}
] ]
], ],
"HTMLLinkElement-disabled-003.tentative.html": [ "HTMLLinkElement-disabled-003.html": [
"fc86e6ba1f052231c4de47cbcece07c85a6f68b9", "3d391bbaff064e094c5a4c1d7c2748257b900a93",
[ [
null, null,
{} {}
] ]
], ],
"HTMLLinkElement-disabled-004.tentative.html": [ "HTMLLinkElement-disabled-004.html": [
"7e6c34ee40d97319e4b2ac39262bba9935fd7d3b", "f163f1d68e066ad89241b43ffd6f29d161b1b3c1",
[ [
null, null,
{} {}
] ]
], ],
"HTMLLinkElement-disabled-005.tentative.html": [ "HTMLLinkElement-disabled-005.html": [
"0233f8c746ed83c1b912df3c0e8ba489d9bd4325", "76de20632726b753e21c15d4a5a18472edd5753d",
[ [
null, null,
{} {}
] ]
], ],
"HTMLLinkElement-disabled-006.tentative.html": [ "HTMLLinkElement-disabled-006.html": [
"5828e1ce14217384fd9445297ddffbfcfc4e4c7e", "02749a2e11d41ca7556b65ecd42ee3a004fa7fe2",
[ [
null, null,
{} {}
] ]
], ],
"HTMLLinkElement-disabled-007.tentative.html": [ "HTMLLinkElement-disabled-007.html": [
"451fc3d591f2c8e12964282eb1314d4962429923", "9a695a964cb5916af69db3ba8a3ff44e00bb1a87",
[ [
null, null,
{} {}
@ -409004,7 +409146,7 @@
] ]
], ],
"ParentNode-replaceChildren.html": [ "ParentNode-replaceChildren.html": [
"6557db4412847be59f4ecedc89731d6fa89314b9", "b1c1008284bbf999d5c61d971b6c8b10704e16e9",
[ [
null, null,
{} {}
@ -450382,8 +450524,8 @@
{} {}
] ]
], ],
"window-domain-success.https.sub.html": [ "window-domain-failure.https.sub.html": [
"9205d01df26e3274692f48aa76d7ffceba9e51ac", "1175b56fb0463449a4a589ed86cb26d27533d0a5",
[ [
null, null,
{} {}
@ -450397,7 +450539,7 @@
] ]
], ],
"window-iframe-messagechannel.https.html": [ "window-iframe-messagechannel.https.html": [
"16a054a52e1ef9ecb42fa5d2e7ceff4a1496f3ab", "acef65cbdff4bd28d6ca4f46c13141e3dbeed95d",
[ [
null, null,
{} {}
@ -450424,13 +450566,6 @@
{} {}
] ]
], ],
"window-similar-but-cross-origin-success.https.sub.html": [
"e25fc9002d02d3c1177447012fcfc9f77381bda7",
[
null,
{}
]
],
"window-simple-success.https.html": [ "window-simple-success.https.html": [
"4b86f9befa6a04c03211a7f30e9cb2d1a63ad06d", "4b86f9befa6a04c03211a7f30e9cb2d1a63ad06d",
[ [
@ -450460,13 +450595,6 @@
} }
] ]
], ],
"structured_clone_bigint.html": [
"b00f88a016bf7f5fa041ba12ce8cb9524f542c0b",
[
null,
{}
]
],
"structuredclone_0.html": [ "structuredclone_0.html": [
"c8a6d38393c0217447992d47c994942e873e70ad", "c8a6d38393c0217447992d47c994942e873e70ad",
[ [
@ -467167,7 +467295,7 @@
}, },
"installedapp": { "installedapp": {
"idlharness.https.window.js": [ "idlharness.https.window.js": [
"3988dba414aabb69ff72d28642d84d89544e63dc", "7774da6803d40031ee9b45f4d0a6bb42f51d4e3d",
[ [
"installedapp/idlharness.https.window.html", "installedapp/idlharness.https.window.html",
{ {
@ -467183,8 +467311,13 @@
[ [
"script", "script",
"/resources/idlharness.js" "/resources/idlharness.js"
],
[
"timeout",
"long"
] ]
] ],
"timeout": "long"
} }
] ]
], ],
@ -467328,7 +467461,7 @@
] ]
], ],
"isIntersecting-threshold.html": [ "isIntersecting-threshold.html": [
"106b65edd7525d089224ff3192f57614d6c58ed6", "842c8e2c9f96deb5e6e167230fae2e32b9d5e779",
[ [
null, null,
{} {}
@ -490015,14 +490148,43 @@
}, },
"screen_enumeration": { "screen_enumeration": {
"getScreens.tentative.https.window.js": [ "getScreens.tentative.https.window.js": [
"76223b7907cd09f971acd0166318d7eb84c84c98", "f496282b01620f8b1d2d10c11e961f6fbb9dc56a",
[ [
"screen_enumeration/getScreens.tentative.https.window.html", "screen_enumeration/getScreens.tentative.https.window.html",
{ {
"script_metadata": [ "script_metadata": [
[ [
"global", "global",
"window,dedicatedworker,sharedworker,serviceworker" "window"
],
[
"script",
"/resources/testdriver.js"
],
[
"script",
"/resources/testdriver-vendor.js"
]
]
}
]
],
"getScreens.values.https.html": [
"5ce54839deefc78a9da98f7283d71c55705281f8",
[
null,
{}
]
],
"screen_enumeration_permission.window.js": [
"00adbfc52acfceedc949093444f24f04f9dc1a27",
[
"screen_enumeration/screen_enumeration_permission.window.html",
{
"script_metadata": [
[
"global",
"window"
], ],
[ [
"script", "script",
@ -514611,7 +514773,7 @@
] ]
], ],
"RTCPeerConnection-mandatory-getStats.https.html": [ "RTCPeerConnection-mandatory-getStats.https.html": [
"e48d133f464a9a1e9f2b17b3c6eb5f3c375cae34", "5b0d59153dca428518ee510e01e1d4ffe87abf00",
[ [
null, null,
{ {
@ -519782,10 +519944,10 @@
}, },
"webtransport": { "webtransport": {
"quic": { "quic": {
"client-indication.any.js": [ "client-indication.sub.any.js": [
"15baa5f8542cb2d1a1c73f03dca24dcd09cfc5f6", "62f2f3fe4d22bd767db78650c1cc9dda2053e6ce",
[ [
"webtransport/quic/client-indication.any.html", "webtransport/quic/client-indication.sub.any.html",
{ {
"quic": true, "quic": true,
"script_metadata": [ "script_metadata": [
@ -519801,7 +519963,7 @@
} }
], ],
[ [
"webtransport/quic/client-indication.any.worker.html", "webtransport/quic/client-indication.sub.any.worker.html",
{ {
"quic": true, "quic": true,
"script_metadata": [ "script_metadata": [
@ -520943,6 +521105,15 @@
} }
}, },
"webxr": { "webxr": {
"anchors": {
"ar_anchor_states.https.html": [
"907da06880e9fe7908a32afbf2ddcb642e174b41",
[
null,
{}
]
]
},
"ar-module": { "ar-module": {
"idlharness.https.window.js": [ "idlharness.https.window.js": [
"51cc3c42808a66ddde083b8982317e8cdd961c71", "51cc3c42808a66ddde083b8982317e8cdd961c71",

View file

@ -1,4 +0,0 @@
[hit-test-floats-002.html]
[Hit test float]
expected: FAIL

View file

@ -0,0 +1,4 @@
[hit-test-floats-005.html]
[Miss clipped float]
expected: FAIL

View file

@ -21,3 +21,6 @@
[test the top of layer] [test the top of layer]
expected: FAIL expected: FAIL
[test some point of the element: top left corner]
expected: FAIL

View file

@ -0,0 +1,7 @@
[HTMLLinkElement-disabled-001.html]
[<link disabled> prevents the stylesheet from being in document.styleSheets (from parser)]
expected: FAIL
[HTMLLinkElement.disabled reflects the <link disabled> attribute, and behaves consistently]
expected: FAIL

View file

@ -0,0 +1,4 @@
[HTMLLinkElement-disabled-002.html]
[HTMLLinkElement.disabled reflects the <link disabled> attribute, and behaves consistently, when the sheet is an alternate]
expected: FAIL

View file

@ -0,0 +1,4 @@
[HTMLLinkElement-disabled-003.html]
[HTMLLinkElement.disabled's explicitly enabled state persists when disconnected and connected again]
expected: FAIL

View file

@ -0,0 +1,4 @@
[HTMLLinkElement-disabled-004.html]
[HTMLLinkElement.disabled's explicitly enabled state doesn't persist on clones]
expected: FAIL

View file

@ -0,0 +1,5 @@
[HTMLLinkElement-disabled-005.html]
expected: TIMEOUT
[HTMLLinkElement.disabled's explicitly enabled state persists regardless of rel]
expected: TIMEOUT

View file

@ -0,0 +1,4 @@
[HTMLLinkElement-disabled-007.html]
[HTMLLinkElement.disabled setter sets the explicitly enabled state if toggled back and forth.]
expected: FAIL

View file

@ -0,0 +1,2 @@
[HTMLLinkElement-disabled-alternate.html]
expected: FAIL

View file

@ -1,2 +0,0 @@
[HTMLLinkElement-disabled-alternate.tentative.html]
expected: FAIL

View file

@ -312,21 +312,18 @@
[fetch(): separate response Content-Type: text/plain ] [fetch(): separate response Content-Type: text/plain ]
expected: NOTRUN expected: NOTRUN
[<iframe>: combined response Content-Type: text/html;" \\" text/plain]
expected: FAIL
[<iframe>: separate response Content-Type: text/html;x=" text/plain]
expected: FAIL
[<iframe>: separate response Content-Type: text/html;" \\" text/plain] [<iframe>: separate response Content-Type: text/html;" \\" text/plain]
expected: FAIL expected: FAIL
[<iframe>: combined response Content-Type: */* text/html]
expected: FAIL
[<iframe>: separate response Content-Type: text/html;" text/plain] [<iframe>: separate response Content-Type: text/html;" text/plain]
expected: FAIL expected: FAIL
[<iframe>: separate response Content-Type: text/html */*] [<iframe>: combined response Content-Type: text/html;" text/plain]
expected: FAIL
[<iframe>: separate response Content-Type: text/html */*;charset=gbk]
expected: FAIL
[<iframe>: combined response Content-Type: text/html;x=" text/plain]
expected: FAIL expected: FAIL

View file

@ -59,6 +59,3 @@
[separate text/javascript;charset=windows-1252 error text/javascript] [separate text/javascript;charset=windows-1252 error text/javascript]
expected: FAIL expected: FAIL
[separate text/javascript error]
expected: FAIL

View file

@ -0,0 +1,4 @@
[traverse_the_history_2.html]
[Multiple history traversals, last would be aborted]
expected: FAIL

View file

@ -0,0 +1,4 @@
[traverse_the_history_3.html]
[Multiple history traversals, last would be aborted]
expected: FAIL

View file

@ -0,0 +1,2 @@
[cross-origin-objects-on-new-window.html]
expected: TIMEOUT

View file

@ -1,5 +1,4 @@
[embedded-opener-remove-frame.html] [embedded-opener-remove-frame.html]
expected: CRASH
[opener and "removed" embedded documents] [opener and "removed" embedded documents]
expected: FAIL expected: FAIL
@ -7,5 +6,5 @@
expected: FAIL expected: FAIL
[opener of discarded auxiliary browsing context] [opener of discarded auxiliary browsing context]
expected: TIMEOUT expected: FAIL

View file

@ -3780,3 +3780,9 @@
[HTMLSlotElement interface: operation assignedNodes(optional AssignedNodesOptions)] [HTMLSlotElement interface: operation assignedNodes(optional AssignedNodesOptions)]
expected: FAIL expected: FAIL
[HTMLLinkElement interface: document.createElement("link") must inherit property "disabled" with the proper type]
expected: FAIL
[HTMLLinkElement interface: attribute disabled]
expected: FAIL

View file

@ -0,0 +1,5 @@
[window-domain-failure.https.sub.html]
expected: TIMEOUT
[SharedArrayBuffer and a same-origin-domain (but not same-origin) iframe]
expected: TIMEOUT

View file

@ -1,4 +0,0 @@
[window-domain-success.https.sub.html]
[postMessaging to a same-origin-domain (but not same-origin) iframe allows them to see each others' modifications]
expected: FAIL

View file

@ -11,3 +11,6 @@
[postMessaging to a same-origin iframe via MessageChannel allows them to see each others' modifications] [postMessaging to a same-origin iframe via MessageChannel allows them to see each others' modifications]
expected: FAIL expected: FAIL
[postMessaging to a same-site iframe via MessageChannel should fail]
expected: FAIL

View file

@ -1,4 +0,0 @@
[window-similar-but-cross-origin-success.https.sub.html]
[postMessaging to a not same-origin-domain, but similar origin, iframe allows them to see each others' modifications]
expected: FAIL

View file

@ -14,6 +14,3 @@
[Host element with delegatesFocus should support autofocus] [Host element with delegatesFocus should support autofocus]
expected: FAIL expected: FAIL
[Non-HTMLElement should not support autofocus]
expected: FAIL

View file

@ -1,5 +1,5 @@
[iframe_sandbox_popups_escaping-2.html] [iframe_sandbox_popups_escaping-2.html]
expected: TIMEOUT expected: CRASH
[Check that popups from a sandboxed iframe escape the sandbox if\n allow-popups-to-escape-sandbox is used] [Check that popups from a sandboxed iframe escape the sandbox if\n allow-popups-to-escape-sandbox is used]
expected: TIMEOUT expected: TIMEOUT

View file

@ -1,5 +1,6 @@
[iframe_sandbox_popups_nonescaping-1.html] [iframe_sandbox_popups_nonescaping-1.html]
type: testharness type: testharness
expected: TIMEOUT
[Check that popups from a sandboxed iframe do not escape the sandbox] [Check that popups from a sandboxed iframe do not escape the sandbox]
expected: FAIL expected: NOTRUN

View file

@ -1,6 +1,6 @@
[iframe_sandbox_popups_nonescaping-2.html] [iframe_sandbox_popups_nonescaping-2.html]
type: testharness type: testharness
expected: CRASH expected: TIMEOUT
[Check that popups from a sandboxed iframe do not escape the sandbox] [Check that popups from a sandboxed iframe do not escape the sandbox]
expected: NOTRUN expected: NOTRUN

View file

@ -0,0 +1,4 @@
[form-double-submit-3.html]
[<button> should have the same double-submit protection as <input type=submit>]
expected: FAIL

View file

@ -4,3 +4,6 @@
[The incumbent settings object while executing the compiled callback via Web IDL's invoke must be that of the node document] [The incumbent settings object while executing the compiled callback via Web IDL's invoke must be that of the node document]
expected: TIMEOUT expected: TIMEOUT
[The entry settings object while executing the compiled callback via Web IDL's invoke must be that of the node document]
expected: FAIL

View file

@ -1,10 +1,9 @@
[promise-job-entry.html] [promise-job-entry.html]
expected: TIMEOUT
[Fulfillment handler on fulfilled promise] [Fulfillment handler on fulfilled promise]
expected: FAIL expected: FAIL
[Rejection handler on pending-then-rejected promise] [Rejection handler on pending-then-rejected promise]
expected: TIMEOUT expected: FAIL
[Sanity check: this all works as expected with no promises involved] [Sanity check: this all works as expected with no promises involved]
expected: FAIL expected: FAIL
@ -16,5 +15,5 @@
expected: FAIL expected: FAIL
[Fulfillment handler on pending-then-fulfilled promise] [Fulfillment handler on pending-then-fulfilled promise]
expected: TIMEOUT expected: FAIL

View file

@ -1,5 +0,0 @@
[017.html]
expected: TIMEOUT
[origin of the script that invoked the method, about:blank]
expected: TIMEOUT

View file

@ -0,0 +1,10 @@
[ar_anchor_states.https.html]
[Anchor creation fails if the feature was not requested]
expected: FAIL
[Anchor creation fails if the feature was requested but the session already ended]
expected: FAIL
[Anchor creation succeeds if the feature was requested]
expected: FAIL

View file

@ -3,6 +3,10 @@
// In order to use this function, please import testdriver.js and // In order to use this function, please import testdriver.js and
// testdriver-vendor.js, and include a <body> element. // testdriver-vendor.js, and include a <body> element.
async function waitForUserActivation() { async function waitForUserActivation() {
if (window.opener) {
throw new Error(
"waitForUserActivation() only works in the top-level frame");
}
const loadedPromise = new Promise(resolve => { const loadedPromise = new Promise(resolve => {
if(document.readyState == 'complete') { if(document.readyState == 'complete') {
resolve(); resolve();

View file

@ -0,0 +1,17 @@
// META: script=/resources/WebIDLParser.js
// META: script=/resources/idlharness.js
'use strict';
// https://wicg.github.io/compression/
idl_test(
['compression'],
[],
idl_array => {
idl_array.add_objects({
CompressionStream: ['new CompressionStream("deflate")'],
DecompressionStream: ['new DecompressionStream("deflate")'],
});
}
);

View file

@ -68,7 +68,7 @@ function create_cookie(origin, name, value, extras) {
function set_prefixed_cookie_via_dom_test(options) { function set_prefixed_cookie_via_dom_test(options) {
promise_test(t => { promise_test(t => {
var name = options.prefix + "prefixtestcookie"; var name = options.prefix + "prefixtestcookie";
erase_cookie_from_js(name, options.paras); erase_cookie_from_js(name, options.params);
t.add_cleanup(() => erase_cookie_from_js(name, options.params)); t.add_cleanup(() => erase_cookie_from_js(name, options.params));
var value = "" + Math.random(); var value = "" + Math.random();
document.cookie = name + "=" + value + ";" + options.params; document.cookie = name + "=" + value + ";" + options.params;
@ -104,11 +104,17 @@ function set_prefixed_cookie_via_http_test(options) {
// SameSite-specific test helpers: // SameSite-specific test helpers:
// //
// status for "network" cookies.
window.SameSiteStatus = { window.SameSiteStatus = {
CROSS_SITE: "cross-site", CROSS_SITE: "cross-site",
LAX: "lax", LAX: "lax",
STRICT: "strict" STRICT: "strict"
}; };
// status for "document.cookie".
window.DomSameSiteStatus = {
CROSS_SITE: "cross-site",
SAME_SITE: "same-site",
};
const wait_for_message = (type, origin) => { const wait_for_message = (type, origin) => {
return new Promise((resolve, reject) => { return new Promise((resolve, reject) => {
@ -155,7 +161,7 @@ async function resetSameSiteCookies(origin, value) {
// Given an |expectedStatus| and |expectedValue|, assert the |cookies| contains the // Given an |expectedStatus| and |expectedValue|, assert the |cookies| contains the
// proper set of cookie names and values, according to the legacy behavior where // proper set of cookie names and values, according to the legacy behavior where
// unspecified SameSite attribute defaults to SameSite=None behavior. // unspecified SameSite attribute defaults to SameSite=None behavior.
function verifySameSiteCookieStateLegacy(expectedStatus, expectedValue, cookies) { function verifySameSiteCookieStateLegacy(expectedStatus, expectedValue, cookies, domCookieStatus) {
assert_equals(cookies["samesite_none"], expectedValue, "SameSite=None cookies are always sent."); assert_equals(cookies["samesite_none"], expectedValue, "SameSite=None cookies are always sent.");
assert_equals(cookies["samesite_unspecified"], expectedValue, "Unspecified-SameSite cookies are always sent."); assert_equals(cookies["samesite_unspecified"], expectedValue, "Unspecified-SameSite cookies are always sent.");
if (expectedStatus == SameSiteStatus.CROSS_SITE) { if (expectedStatus == SameSiteStatus.CROSS_SITE) {
@ -170,14 +176,14 @@ function verifySameSiteCookieStateLegacy(expectedStatus, expectedValue, cookies)
} }
if (cookies["domcookies"]) { if (cookies["domcookies"]) {
verifyDocumentCookie(expectedStatus, expectedValue, cookies["domcookies"]); verifyDocumentCookieLegacy(domCookieStatus, expectedValue, cookies["domcookies"]);
} }
} }
// Same as above except this expects samesite_unspecified to act the same as // Same as above except this expects samesite_unspecified to act the same as
// samesite_lax (which is the behavior expected when SameSiteByDefault is // samesite_lax (which is the behavior expected when SameSiteByDefault is
// enabled). // enabled).
function verifySameSiteCookieStateWithSameSiteByDefault(expectedStatus, expectedValue, cookies) { function verifySameSiteCookieStateWithSameSiteByDefault(expectedStatus, expectedValue, cookies, domCookieStatus) {
assert_equals(cookies["samesite_none"], expectedValue, "SameSite=None cookies are always sent."); assert_equals(cookies["samesite_none"], expectedValue, "SameSite=None cookies are always sent.");
if (expectedStatus == SameSiteStatus.CROSS_SITE) { if (expectedStatus == SameSiteStatus.CROSS_SITE) {
assert_not_equals(cookies["samesite_strict"], expectedValue, "SameSite=Strict cookies are not sent with cross-site requests."); assert_not_equals(cookies["samesite_strict"], expectedValue, "SameSite=Strict cookies are not sent with cross-site requests.");
@ -194,11 +200,11 @@ function verifySameSiteCookieStateWithSameSiteByDefault(expectedStatus, expected
} }
if (cookies["domcookies"]) { if (cookies["domcookies"]) {
verifyDocumentCookie(expectedStatus, expectedValue, cookies["domcookies"]); verifyDocumentCookieWithSameSiteByDefault(domCookieStatus, expectedValue, cookies["domcookies"]);
} }
} }
function verifyDocumentCookie(expectedStatus, expectedValue, domcookies) { function verifyDocumentCookieLegacy(expectedStatus, expectedValue, domcookies) {
const cookies = domcookies.split(";") const cookies = domcookies.split(";")
.map(cookie => cookie.trim().split("=")) .map(cookie => cookie.trim().split("="))
.reduce((obj, cookie) => { .reduce((obj, cookie) => {
@ -206,10 +212,38 @@ function verifyDocumentCookie(expectedStatus, expectedValue, domcookies) {
return obj; return obj;
}, {}); }, {});
if (expectedStatus == DomSameSiteStatus.SAME_SITE) {
assert_equals(cookies["samesite_none"], expectedValue, "SameSite=None cookies are always included in document.cookie."); assert_equals(cookies["samesite_none"], expectedValue, "SameSite=None cookies are always included in document.cookie.");
assert_equals(cookies["samesite_unspecified"], expectedValue, "Unspecified-SameSite cookies are always included in document.cookie."); assert_equals(cookies["samesite_unspecified"], expectedValue, "Unspecified-SameSite cookies are always included in document.cookie.");
assert_equals(cookies["samesite_strict"], expectedValue, "SameSite=Strict cookies are always included in document.cookie."); assert_equals(cookies["samesite_strict"], expectedValue, "SameSite=Strict cookies are always included in document.cookie.");
assert_equals(cookies["samesite_lax"], expectedValue, "SameSite=Lax cookies are always included in document.cookie."); assert_equals(cookies["samesite_lax"], expectedValue, "SameSite=Lax cookies are always included in document.cookie.");
} else if (expectedStatus == DomSameSiteStatus.CROSS_SITE) {
assert_equals(cookies["samesite_none"], expectedValue, "SameSite=None cookies are always included in document.cookie.");
assert_equals(cookies["samesite_unspecified"], expectedValue, "Unspecified-SameSite cookies are always included in document.cookie.");
assert_not_equals(cookies["samesite_strict"], expectedValue, "SameSite=Strict cookies are not included in document.cookie when cross-site.");
assert_not_equals(cookies["samesite_lax"], expectedValue, "SameSite=Lax cookies are not included in document.cookie when cross-site.");
}
}
function verifyDocumentCookieWithSameSiteByDefault(expectedStatus, expectedValue, domcookies) {
const cookies = domcookies.split(";")
.map(cookie => cookie.trim().split("="))
.reduce((obj, cookie) => {
obj[cookie[0]] = cookie[1];
return obj;
}, {});
if (expectedStatus == DomSameSiteStatus.SAME_SITE) {
assert_equals(cookies["samesite_none"], expectedValue, "SameSite=None cookies are always included in document.cookie.");
assert_equals(cookies["samesite_unspecified"], expectedValue, "Unspecified-SameSite cookies are always included in document.cookie.");
assert_equals(cookies["samesite_strict"], expectedValue, "SameSite=Strict cookies are always included in document.cookie.");
assert_equals(cookies["samesite_lax"], expectedValue, "SameSite=Lax cookies are always included in document.cookie.");
} else if (expectedStatus == DomSameSiteStatus.CROSS_SITE) {
assert_equals(cookies["samesite_none"], expectedValue, "SameSite=None cookies are always included in document.cookie.");
assert_not_equals(cookies["samesite_unspecified"], expectedValue, "Unspecified-SameSite cookies are not included in document.cookie when cross-site.");
assert_not_equals(cookies["samesite_strict"], expectedValue, "SameSite=Strict cookies are not included in document.cookie when cross-site.");
assert_not_equals(cookies["samesite_lax"], expectedValue, "SameSite=Lax cookies are not included in document.cookie when cross-site.");
}
} }
function isLegacySameSite() { function isLegacySameSite() {

View file

@ -15,7 +15,7 @@
return credFetch(target + "/cookies/resources/list.py") return credFetch(target + "/cookies/resources/list.py")
.then(r => r.json()) .then(r => r.json())
.then(cookies => getSameSiteVerifier()(expectedStatus, value, cookies)); .then(cookies => getSameSiteVerifier()(expectedStatus, value, cookies, DomSameSiteStatus.SAME_SITE));
}); });
}, title); }, title);
} }

View file

@ -30,7 +30,7 @@
var reloaded = false; var reloaded = false;
var msgHandler = e => { var msgHandler = e => {
try { try {
getSameSiteVerifier()(expectedStatus, value, e.data); getSameSiteVerifier()(expectedStatus, value, e.data, DomSameSiteStatus.SAME_SITE);
} catch (e) { } catch (e) {
reject(e); reject(e);
} }

View file

@ -33,7 +33,7 @@
window.removeEventListener("message", msgHandler); window.removeEventListener("message", msgHandler);
e.source.close(); e.source.close();
try { try {
getSameSiteVerifier()(expectedStatus, value, e.data); getSameSiteVerifier()(expectedStatus, value, e.data, DomSameSiteStatus.SAME_SITE);
resolve("Popup received the cookie."); resolve("Popup received the cookie.");
} catch (e) { } catch (e) {
reject(e); reject(e);

View file

@ -20,7 +20,7 @@
var reloaded = false; var reloaded = false;
var msgHandler = e => { var msgHandler = e => {
try { try {
getSameSiteVerifier()(expectedStatus, value, e.data); getSameSiteVerifier()(expectedStatus, value, e.data, DomSameSiteStatus.SAME_SITE);
} catch (e) { } catch (e) {
reject(e); reject(e);
} }

View file

@ -22,7 +22,7 @@
window.removeEventListener("message", msgHandler); window.removeEventListener("message", msgHandler);
e.source.close(); e.source.close();
try { try {
getSameSiteVerifier()(expectedStatus, value, e.data); getSameSiteVerifier()(expectedStatus, value, e.data, DomSameSiteStatus.SAME_SITE);
resolve("Popup received the cookie."); resolve("Popup received the cookie.");
} catch (e) { } catch (e) {
reject(e); reject(e);

View file

@ -9,7 +9,7 @@
<!-- We're appending an <iframe> to the document's body, so execute tests after we have a body --> <!-- We're appending an <iframe> to the document's body, so execute tests after we have a body -->
<body> <body>
<script> <script>
function create_test(origin, target, expectedStatus, title) { function create_test(origin, target, expectedStatus, expectedDomStatus, title) {
promise_test(t => { promise_test(t => {
var value = "" + Math.random(); var value = "" + Math.random();
return resetSameSiteCookies(origin, value) return resetSameSiteCookies(origin, value)
@ -21,7 +21,7 @@
var reloaded = false; var reloaded = false;
var msgHandler = e => { var msgHandler = e => {
try { try {
getSameSiteVerifier()(expectedStatus, value, e.data); getSameSiteVerifier()(expectedStatus, value, e.data, expectedDomStatus);
} catch (e) { } catch (e) {
reject(e); reject(e);
} }
@ -44,7 +44,7 @@
}, title); }, title);
} }
create_test(SECURE_ORIGIN, SECURE_ORIGIN, SameSiteStatus.STRICT, "Reloaded same-host fetches are strictly same-site"); create_test(SECURE_ORIGIN, SECURE_ORIGIN, SameSiteStatus.STRICT, DomSameSiteStatus.SAME_SITE, "Reloaded same-host fetches are strictly same-site");
create_test(SECURE_SUBDOMAIN_ORIGIN, SECURE_SUBDOMAIN_ORIGIN, SameSiteStatus.STRICT, "Reloaded subdomain fetches are strictly same-site"); create_test(SECURE_SUBDOMAIN_ORIGIN, SECURE_SUBDOMAIN_ORIGIN, SameSiteStatus.STRICT, DomSameSiteStatus.SAME_SITE, "Reloaded subdomain fetches are strictly same-site");
create_test(SECURE_CROSS_SITE_ORIGIN, SECURE_CROSS_SITE_ORIGIN, SameSiteStatus.CROSS_SITE, "Reloaded cross-site fetches are cross-site"); create_test(SECURE_CROSS_SITE_ORIGIN, SECURE_CROSS_SITE_ORIGIN, SameSiteStatus.CROSS_SITE, DomSameSiteStatus.CROSS_SITE, "Reloaded cross-site fetches are cross-site");
</script> </script>

View file

@ -0,0 +1,57 @@
<!DOCTYPE html>
<meta charset="utf-8"/>
<meta name="timeout" content="long">
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
<script src="/cookies/resources/cookie-helper.sub.js"></script>
<!-- We're appending an <iframe> to the document's body, so execute tests after we have a body -->
<body>
<script>
function create_test(target, expectedDomStatus, title) {
promise_test(async t => {
let cookieValue = await new Promise((resolve, reject) => {
var iframe = document.createElement("iframe");
window.onmessage = t.step_func(e => {
if (e.source == iframe.contentWindow) {
document.body.removeChild(iframe);
resolve(e.data.value);
}
});
iframe.src = target + "/cookies/samesite/resources/iframe.document.html";
document.body.appendChild(iframe);
});
await new Promise((resolve, reject) => {
var iframe = document.createElement("iframe");
window.onmessage = t.step_func(e => {
if (e.source == iframe.contentWindow) {
// Cleanup, then verify cookie state:
document.body.removeChild(iframe);
const cookies = e.data;
assert_equals(cookies["dc_samesite_none"], cookieValue, "SameSite=none cookies can be set via document.cookies even by cross-origin documents");
if (expectedDomStatus === DomSameSiteStatus.SAME_SITE) {
assert_equals(cookies["dc_samesite_lax"], cookieValue, "SameSite=lax cookies can be set via document.cookies by same-site documents");
assert_equals(cookies["dc_samesite_strict"], cookieValue, "SameSite=strict cookies can be set via document.cookies by same-site documents");
} else if (expectedDomStatus === DomSameSiteStatus.CROSS_SITE) {
assert_not_equals(cookies["dc_samesite_lax"], cookieValue, "SameSite=lax cookies can be set via document.cookies by same-site documents");
assert_not_equals(cookies["dc_samesite_strict"], cookieValue, "SameSite=strict cookies can be set via document.cookies by same-site documents");
}
resolve();
}
});
iframe.src = target + "/cookies/resources/postToParent.py";
document.body.appendChild(iframe);
});
}, title);
}
create_test(SECURE_ORIGIN, DomSameSiteStatus.SAME_SITE, "Same-site iframes can set lax/strict cookies via document.cookie");
create_test(SECURE_CROSS_SITE_ORIGIN, DomSameSiteStatus.CROSS_SITE, "Cross-site iframe cannot set lax/strict cookies via document.cookie");
</script>

View file

@ -9,7 +9,7 @@
<!-- We're appending an <iframe> to the document's body, so execute tests after we have a body --> <!-- We're appending an <iframe> to the document's body, so execute tests after we have a body -->
<body> <body>
<script> <script>
function create_test(origin, target, expectedStatus, title) { function create_test(origin, target, expectedStatus, expectedDomStatus, title) {
promise_test(t => { promise_test(t => {
var value = "" + Math.random(); var value = "" + Math.random();
return resetSameSiteCookies(origin, value) return resetSameSiteCookies(origin, value)
@ -24,7 +24,7 @@
document.body.removeChild(iframe); document.body.removeChild(iframe);
window.removeEventListener("message", msgHandler); window.removeEventListener("message", msgHandler);
try { try {
getSameSiteVerifier()(expectedStatus, value, e.data); getSameSiteVerifier()(expectedStatus, value, e.data, expectedDomStatus);
resolve(); resolve();
} catch(e) { } catch(e) {
reject(e); reject(e);
@ -41,22 +41,22 @@
} }
// No redirect: // No redirect:
create_test(SECURE_ORIGIN, SECURE_ORIGIN, SameSiteStatus.STRICT, "Same-host fetches are strictly same-site"); create_test(SECURE_ORIGIN, SECURE_ORIGIN, SameSiteStatus.STRICT, DomSameSiteStatus.SAME_SITE, "Same-host fetches are strictly same-site");
create_test(SECURE_SUBDOMAIN_ORIGIN, SECURE_SUBDOMAIN_ORIGIN, SameSiteStatus.STRICT, "Subdomain fetches are strictly same-site"); create_test(SECURE_SUBDOMAIN_ORIGIN, SECURE_SUBDOMAIN_ORIGIN, SameSiteStatus.STRICT, DomSameSiteStatus.SAME_SITE, "Subdomain fetches are strictly same-site");
create_test(SECURE_CROSS_SITE_ORIGIN, SECURE_CROSS_SITE_ORIGIN, SameSiteStatus.CROSS_SITE, "Cross-site fetches are cross-site"); create_test(SECURE_CROSS_SITE_ORIGIN, SECURE_CROSS_SITE_ORIGIN, SameSiteStatus.CROSS_SITE, DomSameSiteStatus.CROSS_SITE, "Cross-site fetches are cross-site");
// Redirect from {same-host,subdomain,cross-site} to same-host: // Redirect from {same-host,subdomain,cross-site} to same-host:
create_test(SECURE_ORIGIN, redirectTo(SECURE_ORIGIN, SECURE_ORIGIN), SameSiteStatus.STRICT, "Same-host redirecting to same-host fetches are strictly same-site"); create_test(SECURE_ORIGIN, redirectTo(SECURE_ORIGIN, SECURE_ORIGIN), SameSiteStatus.STRICT, DomSameSiteStatus.SAME_SITE, "Same-host redirecting to same-host fetches are strictly same-site");
create_test(SECURE_ORIGIN, redirectTo(SECURE_SUBDOMAIN_ORIGIN, SECURE_ORIGIN), SameSiteStatus.STRICT, "Subdomain redirecting to same-host fetches are strictly same-site"); create_test(SECURE_ORIGIN, redirectTo(SECURE_SUBDOMAIN_ORIGIN, SECURE_ORIGIN), SameSiteStatus.STRICT, DomSameSiteStatus.SAME_SITE, "Subdomain redirecting to same-host fetches are strictly same-site");
create_test(SECURE_ORIGIN, redirectTo(SECURE_CROSS_SITE_ORIGIN, SECURE_ORIGIN), SameSiteStatus.STRICT, "Cross-site redirecting to same-host fetches are strictly same-site"); create_test(SECURE_ORIGIN, redirectTo(SECURE_CROSS_SITE_ORIGIN, SECURE_ORIGIN), SameSiteStatus.STRICT, DomSameSiteStatus.SAME_SITE, "Cross-site redirecting to same-host fetches are strictly same-site");
// Redirect from {same-host,subdomain,cross-site} to same-host: // Redirect from {same-host,subdomain,cross-site} to same-host:
create_test(SECURE_SUBDOMAIN_ORIGIN, redirectTo(SECURE_ORIGIN, SECURE_SUBDOMAIN_ORIGIN), SameSiteStatus.STRICT, "Same-host redirecting to subdomain fetches are strictly same-site"); create_test(SECURE_SUBDOMAIN_ORIGIN, redirectTo(SECURE_ORIGIN, SECURE_SUBDOMAIN_ORIGIN), SameSiteStatus.STRICT, DomSameSiteStatus.SAME_SITE, "Same-host redirecting to subdomain fetches are strictly same-site");
create_test(SECURE_SUBDOMAIN_ORIGIN, redirectTo(SECURE_SUBDOMAIN_ORIGIN, SECURE_SUBDOMAIN_ORIGIN), SameSiteStatus.STRICT, "Subdomain redirecting to subdomain fetches are strictly same-site"); create_test(SECURE_SUBDOMAIN_ORIGIN, redirectTo(SECURE_SUBDOMAIN_ORIGIN, SECURE_SUBDOMAIN_ORIGIN), SameSiteStatus.STRICT, DomSameSiteStatus.SAME_SITE, "Subdomain redirecting to subdomain fetches are strictly same-site");
create_test(SECURE_SUBDOMAIN_ORIGIN, redirectTo(SECURE_CROSS_SITE_ORIGIN, SECURE_SUBDOMAIN_ORIGIN), SameSiteStatus.STRICT, "Cross-site redirecting to subdomain fetches are strictly same-site"); create_test(SECURE_SUBDOMAIN_ORIGIN, redirectTo(SECURE_CROSS_SITE_ORIGIN, SECURE_SUBDOMAIN_ORIGIN), SameSiteStatus.STRICT, DomSameSiteStatus.SAME_SITE, "Cross-site redirecting to subdomain fetches are strictly same-site");
// Redirect from {same-host,subdomain,cross-site} to cross-site: // Redirect from {same-host,subdomain,cross-site} to cross-site:
create_test(SECURE_CROSS_SITE_ORIGIN, redirectTo(SECURE_ORIGIN, SECURE_CROSS_SITE_ORIGIN), SameSiteStatus.CROSS_SITE, "Same-host redirecting to cross-site fetches are cross-site"); create_test(SECURE_CROSS_SITE_ORIGIN, redirectTo(SECURE_ORIGIN, SECURE_CROSS_SITE_ORIGIN), SameSiteStatus.CROSS_SITE, DomSameSiteStatus.CROSS_SITE, "Same-host redirecting to cross-site fetches are cross-site");
create_test(SECURE_CROSS_SITE_ORIGIN, redirectTo(SECURE_SUBDOMAIN_ORIGIN, SECURE_CROSS_SITE_ORIGIN), SameSiteStatus.CROSS_SITE, "Subdomain redirecting to cross-site fetches are cross-site"); create_test(SECURE_CROSS_SITE_ORIGIN, redirectTo(SECURE_SUBDOMAIN_ORIGIN, SECURE_CROSS_SITE_ORIGIN), SameSiteStatus.CROSS_SITE, DomSameSiteStatus.CROSS_SITE, "Subdomain redirecting to cross-site fetches are cross-site");
create_test(SECURE_CROSS_SITE_ORIGIN, redirectTo(SECURE_CROSS_SITE_ORIGIN, SECURE_CROSS_SITE_ORIGIN), SameSiteStatus.CROSS_SITE, "Cross-site redirecting to cross-site fetches are cross-site"); create_test(SECURE_CROSS_SITE_ORIGIN, redirectTo(SECURE_CROSS_SITE_ORIGIN, SECURE_CROSS_SITE_ORIGIN), SameSiteStatus.CROSS_SITE, DomSameSiteStatus.CROSS_SITE, "Cross-site redirecting to cross-site fetches are cross-site");
</script> </script>

View file

@ -0,0 +1,8 @@
<!DOCTYPE html>
<script>
var value = "" + Math.random();
document.cookie = `dc_samesite_strict=${value}; secure; sameSite=strict; path=/`;
document.cookie = `dc_samesite_lax=${value}; secure; sameSite=lax; path=/`;
document.cookie = `dc_samesite_none=${value}; secure; sameSite=none; path=/`;
parent.postMessage({value}, "*");
</script>

View file

@ -17,7 +17,7 @@
var reloaded = false; var reloaded = false;
var msgHandler = e => { var msgHandler = e => {
try { try {
getSameSiteVerifier()(expectedStatus, value, e.data); getSameSiteVerifier()(expectedStatus, value, e.data, DomSameSiteStatus.SAME_SITE);
} catch (e) { } catch (e) {
reject(e); reject(e);
} }

View file

@ -19,7 +19,7 @@
window.removeEventListener("message", msgHandler); window.removeEventListener("message", msgHandler);
w.close(); w.close();
try { try {
getSameSiteVerifier()(expectedStatus, value, e.data); getSameSiteVerifier()(expectedStatus, value, e.data, DomSameSiteStatus.SAME_SITE);
resolve("Popup received the cookie."); resolve("Popup received the cookie.");
} catch (e) { } catch (e) {
reject(e); reject(e);

View file

@ -0,0 +1,18 @@
<!DOCTYPE html>
<style>
#target {
width: 220px;
height: 120px;
overflow: scroll;
}
#inner {
padding: 10px;
box-shadow: 10px 10px green inset;
height: 120px;
}
</style>
<div id="target">
<div id="inner">
Passes if green inset shadow is visible.
</div>
</div>

View file

@ -0,0 +1,21 @@
<!DOCTYPE html>
<link rel="help" href="http://www.w3.org/TR/css3-background/#the-box-shadow">
<link rel="match" href="inset-box-shadow-scroll-ref.html"/>
<style>
#target {
width: 200px;
height: 100px;
overflow: scroll;
background-color: white;
box-shadow: 10px 10px green inset;
padding: 10px;
}
#inner {
height: 120px;
}
</style>
<div id="target">
<div id="inner">
Passes if green inset shadow is visible.
</div>
</div>

View file

@ -0,0 +1,23 @@
<!DOCTYPE html>
<link rel="help" href="http://www.w3.org/TR/css3-background/#the-box-shadow">
<link rel="match" href="inset-box-shadow-scroll-ref.html"/>
<style>
#target {
position: absolute;
z-index: 1;
width: 200px;
height: 100px;
overflow: scroll;
background-color: white;
box-shadow: 10px 10px green inset;
padding: 10px;
}
#inner {
height: 120px;
}
</style>
<div id="target">
<div id="inner">
Passes if green inset shadow is visible.
</div>
</div>

View file

@ -20,6 +20,9 @@ test_computed_value("aspect-ratio", "16.3 / 9.5");
test_computed_value("aspect-ratio", "16/9", "16 / 9"); test_computed_value("aspect-ratio", "16/9", "16 / 9");
test_computed_value("aspect-ratio", "0 / 9"); test_computed_value("aspect-ratio", "0 / 9");
test_computed_value("aspect-ratio", "16 / 0"); test_computed_value("aspect-ratio", "16 / 0");
test_computed_value("aspect-ratio", "auto 1");
test_computed_value("aspect-ratio", "auto 1 / 1", "auto 1");
test_computed_value("aspect-ratio", "0 auto", "auto 0");
// The computed value of a <ratio> is the pair of numbers provided, unless // The computed value of a <ratio> is the pair of numbers provided, unless
// both numbers are zero, in which case the computed value is the pair (1, 0) // both numbers are zero, in which case the computed value is the pair (1, 0)
// (same as 1 / 0). // (same as 1 / 0).

View file

@ -13,6 +13,6 @@ test_invalid_value("aspect-ratio", "auto / 16");
test_invalid_value("aspect-ratio", "16 9"); test_invalid_value("aspect-ratio", "16 9");
test_invalid_value("aspect-ratio", "16px / 9px"); test_invalid_value("aspect-ratio", "16px / 9px");
test_invalid_value("aspect-ratio", "16 / -9"); test_invalid_value("aspect-ratio", "16 / -9");
test_invalid_value("aspect-ratio", "1 auto"); test_invalid_value("aspect-ratio", "1 invalid");
test_invalid_value("aspect-ratio", "1.5 auto"); test_invalid_value("aspect-ratio", "invalid 1.5");
</script> </script>

View file

@ -19,6 +19,8 @@ test_valid_value("aspect-ratio", "16 /9", "16 / 9");
test_valid_value("aspect-ratio", "16/ 9", "16 / 9"); test_valid_value("aspect-ratio", "16/ 9", "16 / 9");
test_valid_value("aspect-ratio", "0 / 9"); test_valid_value("aspect-ratio", "0 / 9");
test_valid_value("aspect-ratio", "16 / 0"); test_valid_value("aspect-ratio", "16 / 0");
test_valid_value("aspect-ratio", "auto 16");
test_valid_value("aspect-ratio", "16 auto", "auto 16");
// https://github.com/w3c/csswg-drafts/issues/5084 // https://github.com/w3c/csswg-drafts/issues/5084
test_valid_value("aspect-ratio", "0 / 0", "1 / 0"); test_valid_value("aspect-ratio", "0 / 0", "1 / 0");
</script> </script>

View file

@ -0,0 +1,9 @@
<!DOCTYPE html>
<link rel="help" href="https://crbug.com/903224">
<link rel="match" href="../reference/ref-filled-green-100px-square.xht">
<meta name="assert" content="A positioned absolute table should resolve its %-height against its containing block.">
<p>Test passes if there is a filled green square and <strong>no red</strong>.</p>
<div style="position:relative; width:100px;">
<div style="position:absolute; display:table; width:100%; height:100%; background:green;"></div>
<div style="height:100px; background:red;"></div>
</div>

View file

@ -2,8 +2,7 @@
<title>&lt;link disabled&gt;, HTMLLinkElement.disabled and CSSStyleSheet.disabled interactions</title> <title>&lt;link disabled&gt;, HTMLLinkElement.disabled and CSSStyleSheet.disabled interactions</title>
<link rel="author" title="Emilio Cobos Álvarez" href="mailto:emilio@crisal.io"> <link rel="author" title="Emilio Cobos Álvarez" href="mailto:emilio@crisal.io">
<link rel="author" title="Mozilla" href="https://mozilla.org"> <link rel="author" title="Mozilla" href="https://mozilla.org">
<link rel="help" href="https://bugzilla.mozilla.org/show_bug.cgi?id=1281135"> <link rel="help" href="https://html.spec.whatwg.org/#attr-link-disabled">
<link rel="help" href="https://github.com/whatwg/html/issues/3840">
<script src="/resources/testharness.js"></script> <script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script> <script src="/resources/testharnessreport.js"></script>
<link title="alt" rel="stylesheet" disabled href="data:text/css,html { background: green }"> <link title="alt" rel="stylesheet" disabled href="data:text/css,html { background: green }">

View file

@ -2,8 +2,7 @@
<title>&lt;link disabled&gt;, HTMLLinkElement.disabled and CSSStyleSheet.disabled interactions (alternate)</title> <title>&lt;link disabled&gt;, HTMLLinkElement.disabled and CSSStyleSheet.disabled interactions (alternate)</title>
<link rel="author" title="Emilio Cobos Álvarez" href="mailto:emilio@crisal.io"> <link rel="author" title="Emilio Cobos Álvarez" href="mailto:emilio@crisal.io">
<link rel="author" title="Mozilla" href="https://mozilla.org"> <link rel="author" title="Mozilla" href="https://mozilla.org">
<link rel="help" href="https://bugzilla.mozilla.org/show_bug.cgi?id=1281135"> <link rel="help" href="https://html.spec.whatwg.org/#attr-link-disabled">
<link rel="help" href="https://github.com/whatwg/html/issues/3840">
<script src="/resources/testharness.js"></script> <script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script> <script src="/resources/testharnessreport.js"></script>
<link title="alt" rel="alternate stylesheet" disabled href="data:text/css,html { background: green }"> <link title="alt" rel="alternate stylesheet" disabled href="data:text/css,html { background: green }">

View file

@ -2,8 +2,7 @@
<title>&lt;link disabled&gt;'s "explicitly enabled" state persists after getting disconnected from the tree</title> <title>&lt;link disabled&gt;'s "explicitly enabled" state persists after getting disconnected from the tree</title>
<link rel="author" title="Emilio Cobos Álvarez" href="mailto:emilio@crisal.io"> <link rel="author" title="Emilio Cobos Álvarez" href="mailto:emilio@crisal.io">
<link rel="author" title="Mozilla" href="https://mozilla.org"> <link rel="author" title="Mozilla" href="https://mozilla.org">
<link rel="help" href="https://bugzilla.mozilla.org/show_bug.cgi?id=1281135"> <link rel="help" href="https://html.spec.whatwg.org/#attr-link-disabled">
<link rel="help" href="https://github.com/whatwg/html/issues/3840">
<script src="/resources/testharness.js"></script> <script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script> <script src="/resources/testharnessreport.js"></script>
<link title="alt" rel="alternate stylesheet" disabled href="data:text/css,html { background: green }"> <link title="alt" rel="alternate stylesheet" disabled href="data:text/css,html { background: green }">

View file

@ -2,8 +2,7 @@
<title>&lt;link disabled&gt;'s "explicitly enabled" state doesn't persist for clones</title> <title>&lt;link disabled&gt;'s "explicitly enabled" state doesn't persist for clones</title>
<link rel="author" title="Emilio Cobos Álvarez" href="mailto:emilio@crisal.io"> <link rel="author" title="Emilio Cobos Álvarez" href="mailto:emilio@crisal.io">
<link rel="author" title="Mozilla" href="https://mozilla.org"> <link rel="author" title="Mozilla" href="https://mozilla.org">
<link rel="help" href="https://bugzilla.mozilla.org/show_bug.cgi?id=1281135"> <link rel="help" href="https://html.spec.whatwg.org/#attr-link-disabled">
<link rel="help" href="https://github.com/whatwg/html/issues/3840">
<script src="/resources/testharness.js"></script> <script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script> <script src="/resources/testharnessreport.js"></script>
<link title="alt" rel="alternate stylesheet" disabled href="data:text/css,html { background: green }"> <link title="alt" rel="alternate stylesheet" disabled href="data:text/css,html { background: green }">

View file

@ -2,8 +2,7 @@
<title>&lt;link disabled&gt;'s "explicitly enabled" persists across rel changes</title> <title>&lt;link disabled&gt;'s "explicitly enabled" persists across rel changes</title>
<link rel="author" title="Emilio Cobos Álvarez" href="mailto:emilio@crisal.io"> <link rel="author" title="Emilio Cobos Álvarez" href="mailto:emilio@crisal.io">
<link rel="author" title="Mozilla" href="https://mozilla.org"> <link rel="author" title="Mozilla" href="https://mozilla.org">
<link rel="help" href="https://bugzilla.mozilla.org/show_bug.cgi?id=1281135"> <link rel="help" href="https://html.spec.whatwg.org/#attr-link-disabled">
<link rel="help" href="https://github.com/whatwg/html/issues/3840">
<script src="/resources/testharness.js"></script> <script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script> <script src="/resources/testharnessreport.js"></script>
<link title="alt" rel="yadayada" disabled href="data:text/css,html { background: green }"> <link title="alt" rel="yadayada" disabled href="data:text/css,html { background: green }">

View file

@ -2,8 +2,7 @@
<title>&lt;link disabled&gt;'s "explicitly enabled" state isn't magically set from the setter</title> <title>&lt;link disabled&gt;'s "explicitly enabled" state isn't magically set from the setter</title>
<link rel="author" title="Emilio Cobos Álvarez" href="mailto:emilio@crisal.io"> <link rel="author" title="Emilio Cobos Álvarez" href="mailto:emilio@crisal.io">
<link rel="author" title="Mozilla" href="https://mozilla.org"> <link rel="author" title="Mozilla" href="https://mozilla.org">
<link rel="help" href="https://bugzilla.mozilla.org/show_bug.cgi?id=1281135"> <link rel="help" href="https://html.spec.whatwg.org/#attr-link-disabled">
<link rel="help" href="https://github.com/whatwg/html/issues/3840">
<script src="/resources/testharness.js"></script> <script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script> <script src="/resources/testharnessreport.js"></script>
<script> <script>

View file

@ -2,8 +2,7 @@
<title>&lt;link disabled&gt;'s "explicitly enabled" state works when set explicitly back and forth</title> <title>&lt;link disabled&gt;'s "explicitly enabled" state works when set explicitly back and forth</title>
<link rel="author" title="Emilio Cobos Álvarez" href="mailto:emilio@crisal.io"> <link rel="author" title="Emilio Cobos Álvarez" href="mailto:emilio@crisal.io">
<link rel="author" title="Mozilla" href="https://mozilla.org"> <link rel="author" title="Mozilla" href="https://mozilla.org">
<link rel="help" href="https://bugzilla.mozilla.org/show_bug.cgi?id=1281135"> <link rel="help" href="https://html.spec.whatwg.org/#attr-link-disabled">
<link rel="help" href="https://github.com/whatwg/html/issues/3840">
<script src="/resources/testharness.js"></script> <script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script> <script src="/resources/testharnessreport.js"></script>
<script> <script>

View file

@ -3,8 +3,7 @@
<title>CSS Test: alternate stylesheets can be disabled by HTMLLinkElement.disabled if they have the disabled attribute already</title> <title>CSS Test: alternate stylesheets can be disabled by HTMLLinkElement.disabled if they have the disabled attribute already</title>
<link rel="author" title="Emilio Cobos Álvarez" href="mailto:emilio@crisal.io"> <link rel="author" title="Emilio Cobos Álvarez" href="mailto:emilio@crisal.io">
<link rel="author" title="Mozilla" href="https://mozilla.org"> <link rel="author" title="Mozilla" href="https://mozilla.org">
<link rel="help" href="https://bugzilla.mozilla.org/show_bug.cgi?id=1281135"> <link rel="help" href="https://html.spec.whatwg.org/#attr-link-disabled">
<link rel="help" href="https://github.com/whatwg/html/issues/3840">
<link rel="match" href="HTMLLinkElement-disabled-alternate-ref.html"> <link rel="match" href="HTMLLinkElement-disabled-alternate-ref.html">
<link title="alt" rel="alternate stylesheet" href="data:text/css,html { background: green }" disabled onload="document.documentElement.className = ''"> <link title="alt" rel="alternate stylesheet" href="data:text/css,html { background: green }" disabled onload="document.documentElement.className = ''">
<script> <script>

View file

@ -0,0 +1,2 @@
<!DOCTYPE html>
<div style="position: relative; left: 100px; background: green; width: 100px; height: 100px"></div>

View file

@ -0,0 +1,12 @@
<!DOCTYPE html>
<title>backdrop-filter with opacity:0 under border radius overflow clip should have no effect</title>
<link rel="help" href="https://drafts.fxtf.org/filter-effects-2/#BackdropFilterProperty">
<link rel="match" href="backdrop-filter-opacity-rounded-clip-ref.html">
<div style="width: 300px; height: 200px; border-radius: 80px; overflow: hidden; position: relative">
<!-- This should be fully clipped by the outer rounded clip. -->
<div style="width: 10px; height: 10px; background: cyan"></div>
<!-- This should be fully visible and not affected by the backdrop filter. -->
<div style="position: absolute; top: 0; left: 100px; width: 100px; height: 100px; background: green"></div>
<div style="position: absolute; top: 0; left: 100px; width: 100px; height: 1000px; opacity: 0; backdrop-filter: blur(3px)"></div>
</div>

View file

@ -94,14 +94,14 @@
const observer = new MutationObserver(mutations => { const observer = new MutationObserver(mutations => {
t.step(() => { t.step(() => {
assert_equals(phase, 1); assert_equals(phase, 1, "phase");
assert_equals(mutations.length, 1); assert_equals(mutations.length, 1, "mutations.length");
const mutation = mutations[0]; const mutation = mutations[0];
assert_equals(mutation.type, "childList"); assert_equals(mutation.type, "childList", "mutation.type");
assert_equals(mutation.addedNodes.length, 2); assert_equals(mutation.addedNodes.length, 2, "added nodes length");
assert_array_equals([...mutation.addedNodes], insertions); assert_array_equals([...mutation.addedNodes], insertions, "added nodes");
assert_equals(mutation.removedNodes.length, 2); assert_equals(mutation.removedNodes.length, 2, "removed nodes length");
assert_array_equals([...mutation.removedNodes], children); assert_array_equals([...mutation.removedNodes], children, "removed nodes");
}); });
t.done(); t.done();
}); });

View file

@ -0,0 +1,10 @@
<!DOCTYPE html>
<meta charset="utf-8">
<title>A test page that postMessage a SharedArrayBuffer to the parent and also sets document.domain</title>
<script>
"use strict";
document.domain = "{{host}}";
parent.postMessage(new SharedArrayBuffer(10), "*");
</script>

View file

@ -0,0 +1,7 @@
<!DOCTYPE html>
<script>
const channel = new MessageChannel();
window.parent.postMessage(channel.port2, '*', [channel.port2]);
channel.port1.onmessage = e => { channel.port1.postMessage("message event received") };
channel.port1.onmessageerror = () => channel.port1.postMessage("messageerror event received");
</script>

View file

@ -1,11 +0,0 @@
<!DOCTYPE html>
<meta charset="utf-8">
<title>A test page that messes with a given SharedArrayBuffer and also sets document.domain</title>
<script src="test-incrementer.js"></script>
<script>
"use strict";
document.domain = "{{host}}";
setupDestinationIncrementer(self, parent, "*");
</script>

View file

@ -0,0 +1,23 @@
<!DOCTYPE html>
<meta charset="utf-8">
<title>Structured cloning of SharedArrayBuffers into same-origin-domain windows</title>
<link rel="help" href="https://html.spec.whatwg.org/multipage/#structuredserialize">
<link rel="author" title="Domenic Denicola" href="mailto:d@domenic.me">
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
<div id="log"></div>
<script>
"use strict";
document.domain = "{{host}}";
async_test(t => {
const iframe = document.createElement("iframe");
t.add_cleanup(() => iframe.remove());
iframe.src = "//{{domains[www1]}}:{{location[port]}}/html/infrastructure/safe-passing-of-structured-data/shared-array-buffers/resources/iframe-domain-failure.sub.html";
window.onmessage = t.unreached_func("Got a message event, expected a messageerror event");
window.onmessageerror = t.step_func_done();
document.body.append(iframe);
}, "SharedArrayBuffer and a same-origin-domain (but not same-origin) iframe");
</script>

Some files were not shown because too many files have changed in this diff Show more