mirror of
https://github.com/servo/servo.git
synced 2025-08-04 05:00:08 +01:00
Update web-platform-tests to revision 8fd32a0f7c18d32ae9e147d267746accc3ee9ad5
This commit is contained in:
parent
1a61937031
commit
1c115a1737
133 changed files with 1771 additions and 599 deletions
|
@ -4,7 +4,7 @@
|
||||||
expected: TIMEOUT
|
expected: TIMEOUT
|
||||||
|
|
||||||
[Opening a blob URL in a new window immediately before revoking it works.]
|
[Opening a blob URL in a new window immediately before revoking it works.]
|
||||||
expected: FAIL
|
expected: TIMEOUT
|
||||||
|
|
||||||
[Fetching a blob URL immediately before revoking it works in an iframe.]
|
[Fetching a blob URL immediately before revoking it works in an iframe.]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
|
@ -1,4 +0,0 @@
|
||||||
[hit-test-floats-002.html]
|
|
||||||
[Hit test float]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
|
@ -0,0 +1,4 @@
|
||||||
|
[hit-test-floats-005.html]
|
||||||
|
[Miss clipped float]
|
||||||
|
expected: FAIL
|
||||||
|
|
|
@ -17,3 +17,6 @@
|
||||||
[test the top of layer]
|
[test the top of layer]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
[test some point of the element: top left corner]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
|
|
@ -1,4 +1,4 @@
|
||||||
[HTMLLinkElement-disabled-001.tentative.html]
|
[HTMLLinkElement-disabled-001.html]
|
||||||
[<link disabled> prevents the stylesheet from being in document.styleSheets (from parser)]
|
[<link disabled> prevents the stylesheet from being in document.styleSheets (from parser)]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
|
@ -1,4 +1,4 @@
|
||||||
[HTMLLinkElement-disabled-002.tentative.html]
|
[HTMLLinkElement-disabled-002.html]
|
||||||
[HTMLLinkElement.disabled reflects the <link disabled> attribute, and behaves consistently, when the sheet is an alternate]
|
[HTMLLinkElement.disabled reflects the <link disabled> attribute, and behaves consistently, when the sheet is an alternate]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
|
@ -1,4 +1,4 @@
|
||||||
[HTMLLinkElement-disabled-003.tentative.html]
|
[HTMLLinkElement-disabled-003.html]
|
||||||
[HTMLLinkElement.disabled's explicitly enabled state persists when disconnected and connected again]
|
[HTMLLinkElement.disabled's explicitly enabled state persists when disconnected and connected again]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
|
@ -1,4 +1,4 @@
|
||||||
[HTMLLinkElement-disabled-004.tentative.html]
|
[HTMLLinkElement-disabled-004.html]
|
||||||
[HTMLLinkElement.disabled's explicitly enabled state doesn't persist on clones]
|
[HTMLLinkElement.disabled's explicitly enabled state doesn't persist on clones]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
|
@ -1,4 +1,4 @@
|
||||||
[HTMLLinkElement-disabled-005.tentative.html]
|
[HTMLLinkElement-disabled-005.html]
|
||||||
expected: TIMEOUT
|
expected: TIMEOUT
|
||||||
[HTMLLinkElement.disabled's explicitly enabled state persists regardless of rel]
|
[HTMLLinkElement.disabled's explicitly enabled state persists regardless of rel]
|
||||||
expected: TIMEOUT
|
expected: TIMEOUT
|
|
@ -1,4 +1,4 @@
|
||||||
[HTMLLinkElement-disabled-007.tentative.html]
|
[HTMLLinkElement-disabled-007.html]
|
||||||
[HTMLLinkElement.disabled setter sets the explicitly enabled state if toggled back and forth.]
|
[HTMLLinkElement.disabled setter sets the explicitly enabled state if toggled back and forth.]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
|
@ -0,0 +1,2 @@
|
||||||
|
[HTMLLinkElement-disabled-alternate.html]
|
||||||
|
expected: FAIL
|
|
@ -312,21 +312,18 @@
|
||||||
[Response: combined response Content-Type: text/html;" \\" text/plain ";charset=GBK]
|
[Response: combined response Content-Type: text/html;" \\" text/plain ";charset=GBK]
|
||||||
expected: NOTRUN
|
expected: NOTRUN
|
||||||
|
|
||||||
[<iframe>: combined response Content-Type: text/html;" \\" text/plain]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[<iframe>: separate response Content-Type: text/html;x=" text/plain]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[<iframe>: separate response Content-Type: text/html;" \\" text/plain]
|
[<iframe>: separate response Content-Type: text/html;" \\" text/plain]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[<iframe>: combined response Content-Type: */* text/html]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[<iframe>: separate response Content-Type: text/html;" text/plain]
|
[<iframe>: separate response Content-Type: text/html;" text/plain]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[<iframe>: separate response Content-Type: text/html */*]
|
[<iframe>: combined response Content-Type: text/html;" text/plain]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[<iframe>: separate response Content-Type: text/html */*;charset=gbk]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[<iframe>: combined response Content-Type: text/html;x=" text/plain]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
|
|
@ -59,6 +59,3 @@
|
||||||
[separate text/javascript;charset=windows-1252 error text/javascript]
|
[separate text/javascript;charset=windows-1252 error text/javascript]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[separate text/javascript error]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
|
|
|
@ -1,4 +1,4 @@
|
||||||
[traverse_the_history_4.html]
|
[traverse_the_history_2.html]
|
||||||
[Multiple history traversals, last would be aborted]
|
[Multiple history traversals, last would be aborted]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
|
@ -1,4 +1,4 @@
|
||||||
[traverse_the_history_4.html]
|
[traverse_the_history_3.html]
|
||||||
[Multiple history traversals, last would be aborted]
|
[Multiple history traversals, last would be aborted]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
|
@ -0,0 +1,2 @@
|
||||||
|
[cross-origin-objects-on-new-window.html]
|
||||||
|
expected: TIMEOUT
|
|
@ -1,8 +1,7 @@
|
||||||
[embedded-opener-remove-frame.html]
|
[embedded-opener-remove-frame.html]
|
||||||
expected: CRASH
|
|
||||||
[opener of discarded nested browsing context]
|
[opener of discarded nested browsing context]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[opener of discarded auxiliary browsing context]
|
[opener of discarded auxiliary browsing context]
|
||||||
expected: TIMEOUT
|
expected: FAIL
|
||||||
|
|
||||||
|
|
|
@ -1294,9 +1294,6 @@
|
||||||
[Window interface: window must inherit property "onwebkitanimationiteration" with the proper type]
|
[Window interface: window must inherit property "onwebkitanimationiteration" with the proper type]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Document interface: new Document() must inherit property "queryCommandSupported(DOMString)" with the proper type]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Window interface: attribute onsecuritypolicyviolation]
|
[Window interface: attribute onsecuritypolicyviolation]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
@ -1315,9 +1312,6 @@
|
||||||
[Document interface: new Document() must inherit property "onwebkitanimationiteration" with the proper type]
|
[Document interface: new Document() must inherit property "onwebkitanimationiteration" with the proper type]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Document interface: calling queryCommandSupported(DOMString) on documentWithHandlers with too few arguments must throw TypeError]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Document interface: attribute designMode]
|
[Document interface: attribute designMode]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
@ -1363,9 +1357,6 @@
|
||||||
[Window interface: existence and properties of interface prototype object]
|
[Window interface: existence and properties of interface prototype object]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Document interface: calling queryCommandSupported(DOMString) on new Document() with too few arguments must throw TypeError]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Window interface: operation focus()]
|
[Window interface: operation focus()]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
@ -1408,9 +1399,6 @@
|
||||||
[Document interface: iframe.contentDocument must inherit property "onwebkitanimationiteration" with the proper type]
|
[Document interface: iframe.contentDocument must inherit property "onwebkitanimationiteration" with the proper type]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Document interface: operation queryCommandSupported(DOMString)]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Document interface: attribute onwebkittransitionend]
|
[Document interface: attribute onwebkittransitionend]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
@ -1504,9 +1492,6 @@
|
||||||
[Window interface: window must inherit property "blur()" with the proper type]
|
[Window interface: window must inherit property "blur()" with the proper type]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Document interface: iframe.contentDocument must inherit property "queryCommandSupported(DOMString)" with the proper type]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Document interface: operation execCommand(DOMString, optional boolean, optional DOMString)]
|
[Document interface: operation execCommand(DOMString, optional boolean, optional DOMString)]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
@ -1534,9 +1519,6 @@
|
||||||
[Document interface: iframe.contentDocument must inherit property "queryCommandEnabled(DOMString)" with the proper type]
|
[Document interface: iframe.contentDocument must inherit property "queryCommandEnabled(DOMString)" with the proper type]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Document interface: calling queryCommandSupported(DOMString) on iframe.contentDocument with too few arguments must throw TypeError]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Window interface: operation blur()]
|
[Window interface: operation blur()]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
@ -1615,9 +1597,6 @@
|
||||||
[Document interface: iframe.contentDocument must inherit property "onsecuritypolicyviolation" with the proper type]
|
[Document interface: iframe.contentDocument must inherit property "onsecuritypolicyviolation" with the proper type]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Document interface: documentWithHandlers must inherit property "queryCommandSupported(DOMString)" with the proper type]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Document interface: new Document() must inherit property "queryCommandValue(DOMString)" with the proper type]
|
[Document interface: new Document() must inherit property "queryCommandValue(DOMString)" with the proper type]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
@ -2499,9 +2478,6 @@
|
||||||
[HTMLInputElement interface: createInput("radio") must inherit property "height" with the proper type]
|
[HTMLInputElement interface: createInput("radio") must inherit property "height" with the proper type]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[HTMLImageElement interface: document.createElement("img") must inherit property "referrerPolicy" with the proper type]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[HTMLTableElement interface: document.createElement("table") must inherit property "align" with the proper type]
|
[HTMLTableElement interface: document.createElement("table") must inherit property "align" with the proper type]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
@ -2850,9 +2826,6 @@
|
||||||
[HTMLLinkElement interface: document.createElement("link") must inherit property "imageSizes" with the proper type]
|
[HTMLLinkElement interface: document.createElement("link") must inherit property "imageSizes" with the proper type]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[HTMLImageElement interface: attribute referrerPolicy]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[HTMLInputElement interface: createInput("time") must inherit property "align" with the proper type]
|
[HTMLInputElement interface: createInput("time") must inherit property "align" with the proper type]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
@ -3063,9 +3036,6 @@
|
||||||
[HTMLObjectElement interface: attribute width]
|
[HTMLObjectElement interface: attribute width]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[HTMLImageElement interface: new Image() must inherit property "referrerPolicy" with the proper type]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[HTMLInputElement interface: createInput("reset") must inherit property "useMap" with the proper type]
|
[HTMLInputElement interface: createInput("reset") must inherit property "useMap" with the proper type]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
@ -3495,3 +3465,9 @@
|
||||||
[HTMLSlotElement interface: operation assignedNodes(optional AssignedNodesOptions)]
|
[HTMLSlotElement interface: operation assignedNodes(optional AssignedNodesOptions)]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
[HTMLLinkElement interface: document.createElement("link") must inherit property "disabled" with the proper type]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[HTMLLinkElement interface: attribute disabled]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
|
|
@ -0,0 +1,5 @@
|
||||||
|
[window-domain-failure.https.sub.html]
|
||||||
|
expected: TIMEOUT
|
||||||
|
[SharedArrayBuffer and a same-origin-domain (but not same-origin) iframe]
|
||||||
|
expected: TIMEOUT
|
||||||
|
|
|
@ -0,0 +1,13 @@
|
||||||
|
[window-iframe-messagechannel.https.html]
|
||||||
|
[postMessaging with a MessageChannel that's been cross-site should succeed]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[postMessaging to a same-site iframe via MessageChannel should fail]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[postMessaging to a cross-site iframe via MessageChannel should fail]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[postMessaging to a same-origin iframe via MessageChannel allows them to see each others' modifications]
|
||||||
|
expected: FAIL
|
||||||
|
|
|
@ -14,6 +14,3 @@
|
||||||
[Host element with delegatesFocus should support autofocus]
|
[Host element with delegatesFocus should support autofocus]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Non-HTMLElement should not support autofocus]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
|
|
|
@ -1,5 +1,5 @@
|
||||||
[iframe_sandbox_popups_escaping-2.html]
|
[iframe_sandbox_popups_escaping-2.html]
|
||||||
expected: TIMEOUT
|
expected: CRASH
|
||||||
[Check that popups from a sandboxed iframe escape the sandbox if\n allow-popups-to-escape-sandbox is used]
|
[Check that popups from a sandboxed iframe escape the sandbox if\n allow-popups-to-escape-sandbox is used]
|
||||||
expected: TIMEOUT
|
expected: TIMEOUT
|
||||||
|
|
||||||
|
|
|
@ -1,4 +1,5 @@
|
||||||
[iframe_sandbox_popups_nonescaping-1.html]
|
[iframe_sandbox_popups_nonescaping-1.html]
|
||||||
|
expected: TIMEOUT
|
||||||
[Check that popups from a sandboxed iframe do not escape the sandbox]
|
[Check that popups from a sandboxed iframe do not escape the sandbox]
|
||||||
expected: FAIL
|
expected: NOTRUN
|
||||||
|
|
||||||
|
|
|
@ -1,5 +1,5 @@
|
||||||
[iframe_sandbox_popups_nonescaping-2.html]
|
[iframe_sandbox_popups_nonescaping-2.html]
|
||||||
expected: CRASH
|
expected: TIMEOUT
|
||||||
[Check that popups from a sandboxed iframe do not escape the sandbox]
|
[Check that popups from a sandboxed iframe do not escape the sandbox]
|
||||||
expected: NOTRUN
|
expected: NOTRUN
|
||||||
|
|
||||||
|
|
|
@ -0,0 +1,4 @@
|
||||||
|
[form-double-submit-3.html]
|
||||||
|
[<button> should have the same double-submit protection as <input type=submit>]
|
||||||
|
expected: FAIL
|
||||||
|
|
|
@ -3,3 +3,6 @@
|
||||||
[The incumbent settings object while executing the compiled callback via Web IDL's invoke must be that of the node document]
|
[The incumbent settings object while executing the compiled callback via Web IDL's invoke must be that of the node document]
|
||||||
expected: TIMEOUT
|
expected: TIMEOUT
|
||||||
|
|
||||||
|
[The entry settings object while executing the compiled callback via Web IDL's invoke must be that of the node document]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
|
|
@ -1,10 +1,9 @@
|
||||||
[promise-job-entry.html]
|
[promise-job-entry.html]
|
||||||
expected: TIMEOUT
|
|
||||||
[Fulfillment handler on fulfilled promise]
|
[Fulfillment handler on fulfilled promise]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Rejection handler on pending-then-rejected promise]
|
[Rejection handler on pending-then-rejected promise]
|
||||||
expected: TIMEOUT
|
expected: FAIL
|
||||||
|
|
||||||
[Sanity check: this all works as expected with no promises involved]
|
[Sanity check: this all works as expected with no promises involved]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
@ -16,5 +15,5 @@
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Fulfillment handler on pending-then-fulfilled promise]
|
[Fulfillment handler on pending-then-fulfilled promise]
|
||||||
expected: TIMEOUT
|
expected: FAIL
|
||||||
|
|
||||||
|
|
|
@ -1,5 +0,0 @@
|
||||||
[017.html]
|
|
||||||
expected: TIMEOUT
|
|
||||||
[origin of the script that invoked the method, about:blank]
|
|
||||||
expected: TIMEOUT
|
|
||||||
|
|
|
@ -0,0 +1,10 @@
|
||||||
|
[ar_anchor_states.https.html]
|
||||||
|
[Anchor creation fails if the feature was not requested]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Anchor creation fails if the feature was requested but the session already ended]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Anchor creation succeeds if the feature was requested]
|
||||||
|
expected: FAIL
|
||||||
|
|
|
@ -7,7 +7,7 @@
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Opening a blob URL in a new window immediately before revoking it works.]
|
[Opening a blob URL in a new window immediately before revoking it works.]
|
||||||
expected: FAIL
|
expected: TIMEOUT
|
||||||
|
|
||||||
[Opening a blob URL in a noopener about:blank window immediately before revoking it works.]
|
[Opening a blob URL in a noopener about:blank window immediately before revoking it works.]
|
||||||
expected: TIMEOUT
|
expected: TIMEOUT
|
||||||
|
|
|
@ -122849,6 +122849,32 @@
|
||||||
{}
|
{}
|
||||||
]
|
]
|
||||||
],
|
],
|
||||||
|
"inset-box-shadow-scroll.html": [
|
||||||
|
"7eca4ea544ff76740e13490fb995dfda5705336d",
|
||||||
|
[
|
||||||
|
null,
|
||||||
|
[
|
||||||
|
[
|
||||||
|
"/css/css-backgrounds/inset-box-shadow-scroll-ref.html",
|
||||||
|
"=="
|
||||||
|
]
|
||||||
|
],
|
||||||
|
{}
|
||||||
|
]
|
||||||
|
],
|
||||||
|
"inset-box-shadow-stacking-context-scroll.html": [
|
||||||
|
"edd79b88be2a71fc6054e7e866c8cabe03948a89",
|
||||||
|
[
|
||||||
|
null,
|
||||||
|
[
|
||||||
|
[
|
||||||
|
"/css/css-backgrounds/inset-box-shadow-scroll-ref.html",
|
||||||
|
"=="
|
||||||
|
]
|
||||||
|
],
|
||||||
|
{}
|
||||||
|
]
|
||||||
|
],
|
||||||
"scroll-positioned-multiple-background-images.html": [
|
"scroll-positioned-multiple-background-images.html": [
|
||||||
"a9ca550ce3dea2626de05bf31437a0a19aeedbce",
|
"a9ca550ce3dea2626de05bf31437a0a19aeedbce",
|
||||||
[
|
[
|
||||||
|
@ -165743,6 +165769,19 @@
|
||||||
{}
|
{}
|
||||||
]
|
]
|
||||||
],
|
],
|
||||||
|
"absolute-tables-007.html": [
|
||||||
|
"7922da49224c666156ff20765301b490ef91eafd",
|
||||||
|
[
|
||||||
|
null,
|
||||||
|
[
|
||||||
|
[
|
||||||
|
"/css/reference/ref-filled-green-100px-square.xht",
|
||||||
|
"=="
|
||||||
|
]
|
||||||
|
],
|
||||||
|
{}
|
||||||
|
]
|
||||||
|
],
|
||||||
"anonymous-table-cell-margin-collapsing.html": [
|
"anonymous-table-cell-margin-collapsing.html": [
|
||||||
"23b467ebacc983122a632f4d5971c8daca569420",
|
"23b467ebacc983122a632f4d5971c8daca569420",
|
||||||
[
|
[
|
||||||
|
@ -206304,8 +206343,8 @@
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"cssom": {
|
"cssom": {
|
||||||
"HTMLLinkElement-disabled-alternate.tentative.html": [
|
"HTMLLinkElement-disabled-alternate.html": [
|
||||||
"5b020a172b175ac21d76052cfd44139d376f6605",
|
"f1457c0dcf04d27a52a29fc860e94e81d432e5af",
|
||||||
[
|
[
|
||||||
null,
|
null,
|
||||||
[
|
[
|
||||||
|
@ -206646,6 +206685,19 @@
|
||||||
{}
|
{}
|
||||||
]
|
]
|
||||||
],
|
],
|
||||||
|
"backdrop-filter-opacity-rounded-clip.html": [
|
||||||
|
"88fed5742034734f539d965d99ffa20c16428282",
|
||||||
|
[
|
||||||
|
null,
|
||||||
|
[
|
||||||
|
[
|
||||||
|
"/css/filter-effects/backdrop-filter-opacity-rounded-clip-ref.html",
|
||||||
|
"=="
|
||||||
|
]
|
||||||
|
],
|
||||||
|
{}
|
||||||
|
]
|
||||||
|
],
|
||||||
"backdrop-filter-paint-order.html": [
|
"backdrop-filter-paint-order.html": [
|
||||||
"88531532fc33296e8c8eca5452da04d5d612662d",
|
"88531532fc33296e8c8eca5452da04d5d612662d",
|
||||||
[
|
[
|
||||||
|
@ -246607,7 +246659,7 @@
|
||||||
[]
|
[]
|
||||||
],
|
],
|
||||||
"user-activation.js": [
|
"user-activation.js": [
|
||||||
"babd5b2cd32131a65d3eb81c4f5508fefff064cb",
|
"ed294bb9cb27b552f23061118fcd260dc6b86a8f",
|
||||||
[]
|
[]
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -268229,7 +268281,7 @@
|
||||||
},
|
},
|
||||||
"resources": {
|
"resources": {
|
||||||
"cookie-helper.sub.js": [
|
"cookie-helper.sub.js": [
|
||||||
"fcc1addf2954292037cf77b211bf37920a921e23",
|
"1a163332e3c1821e690e1659842cd30202440f06",
|
||||||
[]
|
[]
|
||||||
],
|
],
|
||||||
"drop.py": [
|
"drop.py": [
|
||||||
|
@ -268315,6 +268367,10 @@
|
||||||
"1dceb4e43681c81b6c1b8877fd2d9f2b34391a02",
|
"1dceb4e43681c81b6c1b8877fd2d9f2b34391a02",
|
||||||
[]
|
[]
|
||||||
],
|
],
|
||||||
|
"iframe.document.html": [
|
||||||
|
"7026beb7e816d7079c1d1625227cabf4d329b7ee",
|
||||||
|
[]
|
||||||
|
],
|
||||||
"navigate.html": [
|
"navigate.html": [
|
||||||
"7d0f87d49439088dc78883e85cfc5c6bcc291d4e",
|
"7d0f87d49439088dc78883e85cfc5c6bcc291d4e",
|
||||||
[]
|
[]
|
||||||
|
@ -287012,6 +287068,10 @@
|
||||||
"10324966edb042c1c7298ce22dad76766c2a777b",
|
"10324966edb042c1c7298ce22dad76766c2a777b",
|
||||||
[]
|
[]
|
||||||
],
|
],
|
||||||
|
"inset-box-shadow-scroll-ref.html": [
|
||||||
|
"55be941bfc35e8d064e811335242fd06dc28da67",
|
||||||
|
[]
|
||||||
|
],
|
||||||
"justfortest.html": [
|
"justfortest.html": [
|
||||||
"e69de29bb2d1d6434b8b29ae775ad8c2e48c5391",
|
"e69de29bb2d1d6434b8b29ae775ad8c2e48c5391",
|
||||||
[]
|
[]
|
||||||
|
@ -311812,6 +311872,10 @@
|
||||||
"0453d7f2feda3367e0f7536d91b0b159d627dd5d",
|
"0453d7f2feda3367e0f7536d91b0b159d627dd5d",
|
||||||
[]
|
[]
|
||||||
],
|
],
|
||||||
|
"backdrop-filter-opacity-rounded-clip-ref.html": [
|
||||||
|
"79177d1238730466d6e5b1a2b5354ee1a1e00db1",
|
||||||
|
[]
|
||||||
|
],
|
||||||
"backdrop-filter-paint-order-ref.html": [
|
"backdrop-filter-paint-order-ref.html": [
|
||||||
"bd82e520f0e70b75e45c687cb46f957a579e2358",
|
"bd82e520f0e70b75e45c687cb46f957a579e2358",
|
||||||
[]
|
[]
|
||||||
|
@ -328793,6 +328857,14 @@
|
||||||
"6604450991a122e3e241e40b1b9e0516c525389d",
|
"6604450991a122e3e241e40b1b9e0516c525389d",
|
||||||
[]
|
[]
|
||||||
],
|
],
|
||||||
|
"iframe-domain-failure.sub.html": [
|
||||||
|
"cf795c23805889f6e036873264444b631862d204",
|
||||||
|
[]
|
||||||
|
],
|
||||||
|
"iframe-domain-failure.sub.html.headers": [
|
||||||
|
"56d0ac342824434c621fb50f9351e2e74aa077cb",
|
||||||
|
[]
|
||||||
|
],
|
||||||
"iframe-failure.html": [
|
"iframe-failure.html": [
|
||||||
"2c33dba79a2fb9e6a81fc9ee5805b378e826f725",
|
"2c33dba79a2fb9e6a81fc9ee5805b378e826f725",
|
||||||
[]
|
[]
|
||||||
|
@ -328817,11 +328889,11 @@
|
||||||
"4e798cd9f5d3f756df077a43ce9a1a6f9b41fd28",
|
"4e798cd9f5d3f756df077a43ce9a1a6f9b41fd28",
|
||||||
[]
|
[]
|
||||||
],
|
],
|
||||||
"incrementer-iframe-domain.sub.html": [
|
"iframe-messagechannel-site-failure.html": [
|
||||||
"a6dd70177584c9115c24beb281e7681110c07624",
|
"95a610f928584b89a5d9fb3a711337db21f839e9",
|
||||||
[]
|
[]
|
||||||
],
|
],
|
||||||
"incrementer-iframe-domain.sub.html.headers": [
|
"iframe-messagechannel-site-failure.html.headers": [
|
||||||
"56d0ac342824434c621fb50f9351e2e74aa077cb",
|
"56d0ac342824434c621fb50f9351e2e74aa077cb",
|
||||||
[]
|
[]
|
||||||
],
|
],
|
||||||
|
@ -328934,7 +329006,7 @@
|
||||||
"63b60e490f47f4db77d33d7a4ca2f5b9a4181de8",
|
"63b60e490f47f4db77d33d7a4ca2f5b9a4181de8",
|
||||||
[]
|
[]
|
||||||
],
|
],
|
||||||
"window-domain-success.https.sub.html.headers": [
|
"window-domain-failure.https.sub.html.headers": [
|
||||||
"63b60e490f47f4db77d33d7a4ca2f5b9a4181de8",
|
"63b60e490f47f4db77d33d7a4ca2f5b9a4181de8",
|
||||||
[]
|
[]
|
||||||
],
|
],
|
||||||
|
@ -328958,10 +329030,6 @@
|
||||||
"63b60e490f47f4db77d33d7a4ca2f5b9a4181de8",
|
"63b60e490f47f4db77d33d7a4ca2f5b9a4181de8",
|
||||||
[]
|
[]
|
||||||
],
|
],
|
||||||
"window-similar-but-cross-origin-success.https.sub.html.headers": [
|
|
||||||
"63b60e490f47f4db77d33d7a4ca2f5b9a4181de8",
|
|
||||||
[]
|
|
||||||
],
|
|
||||||
"window-simple-success.https.html.headers": [
|
"window-simple-success.https.html.headers": [
|
||||||
"63b60e490f47f4db77d33d7a4ca2f5b9a4181de8",
|
"63b60e490f47f4db77d33d7a4ca2f5b9a4181de8",
|
||||||
[]
|
[]
|
||||||
|
@ -333006,7 +333074,7 @@
|
||||||
[]
|
[]
|
||||||
],
|
],
|
||||||
"structured-clone-battery-of-tests.js": [
|
"structured-clone-battery-of-tests.js": [
|
||||||
"751a0e1a9ea8b549543f2e78551b0d00b4fc6127",
|
"0c96ded2088357e0d581587f4a1a66c74c9198b6",
|
||||||
[]
|
[]
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
@ -333908,7 +333976,7 @@
|
||||||
},
|
},
|
||||||
"interfaces": {
|
"interfaces": {
|
||||||
"BackgroundSync.idl": [
|
"BackgroundSync.idl": [
|
||||||
"f84faf7bcd3bf1e836136bfbe34b6ba68f2bd25c",
|
"c52dcdb89843e80e9bd89591df76ba26f7172dab",
|
||||||
[]
|
[]
|
||||||
],
|
],
|
||||||
"CSP.idl": [
|
"CSP.idl": [
|
||||||
|
@ -333999,6 +334067,10 @@
|
||||||
"fe77a2f942827c5fbb842db74556d5e8353a9cb3",
|
"fe77a2f942827c5fbb842db74556d5e8353a9cb3",
|
||||||
[]
|
[]
|
||||||
],
|
],
|
||||||
|
"compression.idl": [
|
||||||
|
"47d2b9e48d06ae830ade5aef4b1c0914995a5e1f",
|
||||||
|
[]
|
||||||
|
],
|
||||||
"console.idl": [
|
"console.idl": [
|
||||||
"3cd3c06b54b022c61857a6a29e8e97bf4fa9b47b",
|
"3cd3c06b54b022c61857a6a29e8e97bf4fa9b47b",
|
||||||
[]
|
[]
|
||||||
|
@ -334159,6 +334231,10 @@
|
||||||
"ada6c0c302cdff87a78a0e8ec5ac25a8f0e64922",
|
"ada6c0c302cdff87a78a0e8ec5ac25a8f0e64922",
|
||||||
[]
|
[]
|
||||||
],
|
],
|
||||||
|
"get-installed-related-apps.idl": [
|
||||||
|
"cbea101d300f0082d7d020809c9c2da3e581ad90",
|
||||||
|
[]
|
||||||
|
],
|
||||||
"gyroscope.idl": [
|
"gyroscope.idl": [
|
||||||
"3754fd81e6bf605a308794e5b759ecd8784a6a15",
|
"3754fd81e6bf605a308794e5b759ecd8784a6a15",
|
||||||
[]
|
[]
|
||||||
|
@ -334176,7 +334252,7 @@
|
||||||
[]
|
[]
|
||||||
],
|
],
|
||||||
"html.idl": [
|
"html.idl": [
|
||||||
"7b2a96ce6760a05b49e9c445b4050a991acd342b",
|
"09e1a29043b5bb56b3366d2cbb13b5e834424121",
|
||||||
[]
|
[]
|
||||||
],
|
],
|
||||||
"image-capture.idl": [
|
"image-capture.idl": [
|
||||||
|
@ -334745,7 +334821,7 @@
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"lint.ignore": [
|
"lint.ignore": [
|
||||||
"776c6332900bdd6bacade294131ce1ba028c7d1b",
|
"078a706f079c3cfc2a88dbd8ce9b3b290d1ffcfb",
|
||||||
[]
|
[]
|
||||||
],
|
],
|
||||||
"loading": {
|
"loading": {
|
||||||
|
@ -339504,6 +339580,14 @@
|
||||||
"ce2b968391343339a9958100f564fa73d5c01509",
|
"ce2b968391343339a9958100f564fa73d5c01509",
|
||||||
[]
|
[]
|
||||||
],
|
],
|
||||||
|
"mock-screenenumeration.js": [
|
||||||
|
"0f71db8f5062a3ff0344d7999d65ddd5271a04fc",
|
||||||
|
[]
|
||||||
|
],
|
||||||
|
"mock-screenenumeration.js.header": [
|
||||||
|
"6805c323df5a975231648b830e33ce183c3cbbd3",
|
||||||
|
[]
|
||||||
|
],
|
||||||
"mock-sms-receiver.js": [
|
"mock-sms-receiver.js": [
|
||||||
"c4aa9a86f2c8a15303f96cc9859b2ec146eb2f58",
|
"c4aa9a86f2c8a15303f96cc9859b2ec146eb2f58",
|
||||||
[]
|
[]
|
||||||
|
@ -339589,7 +339673,7 @@
|
||||||
[]
|
[]
|
||||||
],
|
],
|
||||||
"webxr-test-math-helper.js": [
|
"webxr-test-math-helper.js": [
|
||||||
"14e163712670f1dd5f081d0189bfe719bbd08bd6",
|
"22c6c12d08fe1a739857bec0da88e89c8abffc60",
|
||||||
[]
|
[]
|
||||||
],
|
],
|
||||||
"webxr-test-math-helper.js.headers": [
|
"webxr-test-math-helper.js.headers": [
|
||||||
|
@ -339597,7 +339681,7 @@
|
||||||
[]
|
[]
|
||||||
],
|
],
|
||||||
"webxr-test.js": [
|
"webxr-test.js": [
|
||||||
"4809ac86bd3e487aceefbfb62ccd191e6395d70a",
|
"adbb42eed8b70bef4c2786344fc24d90faf47bb8",
|
||||||
[]
|
[]
|
||||||
],
|
],
|
||||||
"webxr-test.js.headers": [
|
"webxr-test.js.headers": [
|
||||||
|
@ -340124,6 +340208,18 @@
|
||||||
[]
|
[]
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
"screen_enumeration": {
|
||||||
|
"README.md": [
|
||||||
|
"04b2ecce7c274f03fd5b0dbebecf82882f009902",
|
||||||
|
[]
|
||||||
|
],
|
||||||
|
"resources": {
|
||||||
|
"screenenumeration-helpers.js": [
|
||||||
|
"d96fca74b5d4520103f459120881b2aa03994a54",
|
||||||
|
[]
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
"scroll-animations": {
|
"scroll-animations": {
|
||||||
"META.yml": [
|
"META.yml": [
|
||||||
"c53f1f432fe1ec2887e30af396a1f1574b76b95d",
|
"c53f1f432fe1ec2887e30af396a1f1574b76b95d",
|
||||||
|
@ -344821,11 +344917,11 @@
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"commands.json": [
|
"commands.json": [
|
||||||
"044322eed3baf467c6d809fc26ac958598942311",
|
"d4e3ce8128002b8f83f33dc4a21852afd908e724",
|
||||||
[]
|
[]
|
||||||
],
|
],
|
||||||
"quic_transport_server.py": [
|
"quic_transport_server.py": [
|
||||||
"9a04ad17f195c6e5d233e84a9b23904cccfeccd6",
|
"deef46fb8a74c8ff41c0b5e8d229ab7a34d19c10",
|
||||||
[]
|
[]
|
||||||
],
|
],
|
||||||
"requirements.txt": [
|
"requirements.txt": [
|
||||||
|
@ -344833,7 +344929,7 @@
|
||||||
[]
|
[]
|
||||||
],
|
],
|
||||||
"serve.py": [
|
"serve.py": [
|
||||||
"9893f25e27bdb3afd4bf39921e96abdcc4233f9d",
|
"517b4c34b93ed4293c43f30a2baec8b920197d27",
|
||||||
[]
|
[]
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
@ -344935,7 +345031,7 @@
|
||||||
[]
|
[]
|
||||||
],
|
],
|
||||||
"serve.py": [
|
"serve.py": [
|
||||||
"43ff7bd0dfbac5eae74cbe43235f016c4fe14d35",
|
"d98c81eafbb86585ecac5b7047a40d874eb54fe7",
|
||||||
[]
|
[]
|
||||||
],
|
],
|
||||||
"test_functional.py": [
|
"test_functional.py": [
|
||||||
|
@ -350418,7 +350514,7 @@
|
||||||
[]
|
[]
|
||||||
],
|
],
|
||||||
"environment.py": [
|
"environment.py": [
|
||||||
"f76836ea66b59bb16f2d3792451bcf28ecb2fb44",
|
"1236d1f9bc291f590f74236cf2ad01d84d4785df",
|
||||||
[]
|
[]
|
||||||
],
|
],
|
||||||
"executors": {
|
"executors": {
|
||||||
|
@ -351073,6 +351169,10 @@
|
||||||
"869d3d4604409411984cb49fcd40eb7e971b3c52",
|
"869d3d4604409411984cb49fcd40eb7e971b3c52",
|
||||||
[]
|
[]
|
||||||
],
|
],
|
||||||
|
"test_response.py": [
|
||||||
|
"f8048ac1ce5529a600df1da4db9dfb4154f202c9",
|
||||||
|
[]
|
||||||
|
],
|
||||||
"test_stash.py": [
|
"test_stash.py": [
|
||||||
"31af1558b0cc5c046843e0e96569db42c467cf22",
|
"31af1558b0cc5c046843e0e96569db42c467cf22",
|
||||||
[]
|
[]
|
||||||
|
@ -351112,7 +351212,7 @@
|
||||||
[]
|
[]
|
||||||
],
|
],
|
||||||
"response.py": [
|
"response.py": [
|
||||||
"b6f274474519846d298a29da0b3db3961999b24f",
|
"b24f0cdf476850a10cdbe94bb857fc61ce32bcf8",
|
||||||
[]
|
[]
|
||||||
],
|
],
|
||||||
"router.py": [
|
"router.py": [
|
||||||
|
@ -355959,7 +356059,7 @@
|
||||||
[]
|
[]
|
||||||
],
|
],
|
||||||
"webxr_test_constants.js": [
|
"webxr_test_constants.js": [
|
||||||
"3ae294c015a73fc193ce68c0f80aec4111c3302c",
|
"139ab775684c427e39bc50719226c96fcbd3a5d5",
|
||||||
[]
|
[]
|
||||||
],
|
],
|
||||||
"webxr_test_constants_fake_world.js": [
|
"webxr_test_constants_fake_world.js": [
|
||||||
|
@ -375181,6 +375281,39 @@
|
||||||
"timeout": "long"
|
"timeout": "long"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
],
|
||||||
|
"idlharness.https.any.js": [
|
||||||
|
"c439d5b51910ba570c2b0273fc813e7e51c02c4d",
|
||||||
|
[
|
||||||
|
"compression/idlharness.https.any.html",
|
||||||
|
{
|
||||||
|
"script_metadata": [
|
||||||
|
[
|
||||||
|
"script",
|
||||||
|
"/resources/WebIDLParser.js"
|
||||||
|
],
|
||||||
|
[
|
||||||
|
"script",
|
||||||
|
"/resources/idlharness.js"
|
||||||
|
]
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
[
|
||||||
|
"compression/idlharness.https.any.worker.html",
|
||||||
|
{
|
||||||
|
"script_metadata": [
|
||||||
|
[
|
||||||
|
"script",
|
||||||
|
"/resources/WebIDLParser.js"
|
||||||
|
],
|
||||||
|
[
|
||||||
|
"script",
|
||||||
|
"/resources/idlharness.js"
|
||||||
|
]
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"console": {
|
"console": {
|
||||||
|
@ -380021,7 +380154,7 @@
|
||||||
]
|
]
|
||||||
],
|
],
|
||||||
"fetch.https.html": [
|
"fetch.https.html": [
|
||||||
"4daf357004a71cea5b0e58a44bf8919d96ad7ce8",
|
"89050e03afd7f5aab3288be468f2dbf9712cc71d",
|
||||||
[
|
[
|
||||||
null,
|
null,
|
||||||
{
|
{
|
||||||
|
@ -380036,7 +380169,7 @@
|
||||||
]
|
]
|
||||||
],
|
],
|
||||||
"form-get-blank-reload.https.html": [
|
"form-get-blank-reload.https.html": [
|
||||||
"026254549729cd4b5acc1f0c59833c55aa4e56e2",
|
"611255f7374dae54994a2c3b20687765969d708f",
|
||||||
[
|
[
|
||||||
null,
|
null,
|
||||||
{}
|
{}
|
||||||
|
@ -380047,7 +380180,7 @@
|
||||||
]
|
]
|
||||||
],
|
],
|
||||||
"form-get-blank.https.html": [
|
"form-get-blank.https.html": [
|
||||||
"61af99967292abe8249f81d9fcd098c1f51273d7",
|
"6fe28c21cc0c3a5912ef3f69e751ba7e936a15c0",
|
||||||
[
|
[
|
||||||
null,
|
null,
|
||||||
{
|
{
|
||||||
|
@ -380062,7 +380195,7 @@
|
||||||
]
|
]
|
||||||
],
|
],
|
||||||
"form-post-blank-reload.https.html": [
|
"form-post-blank-reload.https.html": [
|
||||||
"69f720efc5bb129b08beaafeb9bdae2c00239cd2",
|
"fedb0a03c5a9a69d64d0f372855f1f512d1a9a2f",
|
||||||
[
|
[
|
||||||
null,
|
null,
|
||||||
{}
|
{}
|
||||||
|
@ -380073,7 +380206,7 @@
|
||||||
]
|
]
|
||||||
],
|
],
|
||||||
"form-post-blank.https.html": [
|
"form-post-blank.https.html": [
|
||||||
"4ffd522b322e158baf7d1877aa5485dc010159b1",
|
"d3cd369ca67a86bcd25c4f5a901e669beb77446c",
|
||||||
[
|
[
|
||||||
null,
|
null,
|
||||||
{
|
{
|
||||||
|
@ -380088,7 +380221,7 @@
|
||||||
]
|
]
|
||||||
],
|
],
|
||||||
"iframe-reload.https.html": [
|
"iframe-reload.https.html": [
|
||||||
"9bfbdfd64186848df1b7b7165b5799d54c7dc8f7",
|
"a33c4dd4eb2ac9aa22ee6c45157d6f1cfb48675a",
|
||||||
[
|
[
|
||||||
null,
|
null,
|
||||||
{
|
{
|
||||||
|
@ -380102,8 +380235,17 @@
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
],
|
],
|
||||||
|
"iframe.document.html": [
|
||||||
|
"2d276dbcaa9ce740ffdd8c8516defe18ab51de95",
|
||||||
|
[
|
||||||
|
null,
|
||||||
|
{
|
||||||
|
"timeout": "long"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
],
|
||||||
"iframe.https.html": [
|
"iframe.https.html": [
|
||||||
"446b8c50c004a5c6599b73052ba870dac4aa70a9",
|
"04ebb95836d7b4700e93eedb7ef0a07b943ec3fa",
|
||||||
[
|
[
|
||||||
null,
|
null,
|
||||||
{
|
{
|
||||||
|
@ -380173,7 +380315,7 @@
|
||||||
]
|
]
|
||||||
],
|
],
|
||||||
"window-open-reload.https.html": [
|
"window-open-reload.https.html": [
|
||||||
"ee2091b1373a1da7068722c2557332e3a7f60b05",
|
"f21b6a77de5c5bac6cc19195f098995b21deb3b5",
|
||||||
[
|
[
|
||||||
null,
|
null,
|
||||||
{}
|
{}
|
||||||
|
@ -380184,7 +380326,7 @@
|
||||||
]
|
]
|
||||||
],
|
],
|
||||||
"window-open.https.html": [
|
"window-open.https.html": [
|
||||||
"d685eb47fd07872116caa22d2b8ca23774f26a81",
|
"7ee3ef43abea9bd86c4989b304846a7395d9d447",
|
||||||
[
|
[
|
||||||
null,
|
null,
|
||||||
{
|
{
|
||||||
|
@ -394330,21 +394472,21 @@
|
||||||
"aspect-ratio": {
|
"aspect-ratio": {
|
||||||
"parsing": {
|
"parsing": {
|
||||||
"contain-intrinsic-size-computed.html": [
|
"contain-intrinsic-size-computed.html": [
|
||||||
"bf56adb9fe136d5e73c4dd5caec2cb4040b75115",
|
"76fb5842ae691de4025795bc80777a61ceebbb6e",
|
||||||
[
|
[
|
||||||
null,
|
null,
|
||||||
{}
|
{}
|
||||||
]
|
]
|
||||||
],
|
],
|
||||||
"contain-intrinsic-size-invalid.html": [
|
"contain-intrinsic-size-invalid.html": [
|
||||||
"20378ab8cfe4f346d841a9a59e579a90b8147515",
|
"e13c3ad07e1c25777cc9533407c0e57f6c6e5ddb",
|
||||||
[
|
[
|
||||||
null,
|
null,
|
||||||
{}
|
{}
|
||||||
]
|
]
|
||||||
],
|
],
|
||||||
"contain-intrinsic-size-valid.html": [
|
"contain-intrinsic-size-valid.html": [
|
||||||
"96b3ca59acc8af8c292fdaf2cc255475e7929d1f",
|
"c7add59d1e408ad7f7aee459da49f9f072de845f",
|
||||||
[
|
[
|
||||||
null,
|
null,
|
||||||
{}
|
{}
|
||||||
|
@ -403010,50 +403152,50 @@
|
||||||
{}
|
{}
|
||||||
]
|
]
|
||||||
],
|
],
|
||||||
"HTMLLinkElement-disabled-001.tentative.html": [
|
"HTMLLinkElement-disabled-001.html": [
|
||||||
"877356f924de995aca09579739c6120af2caab1e",
|
"f2c5d0a545939b78e5833c19e83de660dd845ea2",
|
||||||
[
|
[
|
||||||
null,
|
null,
|
||||||
{}
|
{}
|
||||||
]
|
]
|
||||||
],
|
],
|
||||||
"HTMLLinkElement-disabled-002.tentative.html": [
|
"HTMLLinkElement-disabled-002.html": [
|
||||||
"9c46f60a6214538168b48cd06b16fda0ce52ec63",
|
"34bd8182fef40b0b596661437f7840735f83c517",
|
||||||
[
|
[
|
||||||
null,
|
null,
|
||||||
{}
|
{}
|
||||||
]
|
]
|
||||||
],
|
],
|
||||||
"HTMLLinkElement-disabled-003.tentative.html": [
|
"HTMLLinkElement-disabled-003.html": [
|
||||||
"fc86e6ba1f052231c4de47cbcece07c85a6f68b9",
|
"3d391bbaff064e094c5a4c1d7c2748257b900a93",
|
||||||
[
|
[
|
||||||
null,
|
null,
|
||||||
{}
|
{}
|
||||||
]
|
]
|
||||||
],
|
],
|
||||||
"HTMLLinkElement-disabled-004.tentative.html": [
|
"HTMLLinkElement-disabled-004.html": [
|
||||||
"7e6c34ee40d97319e4b2ac39262bba9935fd7d3b",
|
"f163f1d68e066ad89241b43ffd6f29d161b1b3c1",
|
||||||
[
|
[
|
||||||
null,
|
null,
|
||||||
{}
|
{}
|
||||||
]
|
]
|
||||||
],
|
],
|
||||||
"HTMLLinkElement-disabled-005.tentative.html": [
|
"HTMLLinkElement-disabled-005.html": [
|
||||||
"0233f8c746ed83c1b912df3c0e8ba489d9bd4325",
|
"76de20632726b753e21c15d4a5a18472edd5753d",
|
||||||
[
|
[
|
||||||
null,
|
null,
|
||||||
{}
|
{}
|
||||||
]
|
]
|
||||||
],
|
],
|
||||||
"HTMLLinkElement-disabled-006.tentative.html": [
|
"HTMLLinkElement-disabled-006.html": [
|
||||||
"5828e1ce14217384fd9445297ddffbfcfc4e4c7e",
|
"02749a2e11d41ca7556b65ecd42ee3a004fa7fe2",
|
||||||
[
|
[
|
||||||
null,
|
null,
|
||||||
{}
|
{}
|
||||||
]
|
]
|
||||||
],
|
],
|
||||||
"HTMLLinkElement-disabled-007.tentative.html": [
|
"HTMLLinkElement-disabled-007.html": [
|
||||||
"451fc3d591f2c8e12964282eb1314d4962429923",
|
"9a695a964cb5916af69db3ba8a3ff44e00bb1a87",
|
||||||
[
|
[
|
||||||
null,
|
null,
|
||||||
{}
|
{}
|
||||||
|
@ -409004,7 +409146,7 @@
|
||||||
]
|
]
|
||||||
],
|
],
|
||||||
"ParentNode-replaceChildren.html": [
|
"ParentNode-replaceChildren.html": [
|
||||||
"6557db4412847be59f4ecedc89731d6fa89314b9",
|
"b1c1008284bbf999d5c61d971b6c8b10704e16e9",
|
||||||
[
|
[
|
||||||
null,
|
null,
|
||||||
{}
|
{}
|
||||||
|
@ -450382,8 +450524,8 @@
|
||||||
{}
|
{}
|
||||||
]
|
]
|
||||||
],
|
],
|
||||||
"window-domain-success.https.sub.html": [
|
"window-domain-failure.https.sub.html": [
|
||||||
"9205d01df26e3274692f48aa76d7ffceba9e51ac",
|
"1175b56fb0463449a4a589ed86cb26d27533d0a5",
|
||||||
[
|
[
|
||||||
null,
|
null,
|
||||||
{}
|
{}
|
||||||
|
@ -450397,7 +450539,7 @@
|
||||||
]
|
]
|
||||||
],
|
],
|
||||||
"window-iframe-messagechannel.https.html": [
|
"window-iframe-messagechannel.https.html": [
|
||||||
"16a054a52e1ef9ecb42fa5d2e7ceff4a1496f3ab",
|
"acef65cbdff4bd28d6ca4f46c13141e3dbeed95d",
|
||||||
[
|
[
|
||||||
null,
|
null,
|
||||||
{}
|
{}
|
||||||
|
@ -450424,13 +450566,6 @@
|
||||||
{}
|
{}
|
||||||
]
|
]
|
||||||
],
|
],
|
||||||
"window-similar-but-cross-origin-success.https.sub.html": [
|
|
||||||
"e25fc9002d02d3c1177447012fcfc9f77381bda7",
|
|
||||||
[
|
|
||||||
null,
|
|
||||||
{}
|
|
||||||
]
|
|
||||||
],
|
|
||||||
"window-simple-success.https.html": [
|
"window-simple-success.https.html": [
|
||||||
"4b86f9befa6a04c03211a7f30e9cb2d1a63ad06d",
|
"4b86f9befa6a04c03211a7f30e9cb2d1a63ad06d",
|
||||||
[
|
[
|
||||||
|
@ -450460,13 +450595,6 @@
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
],
|
],
|
||||||
"structured_clone_bigint.html": [
|
|
||||||
"b00f88a016bf7f5fa041ba12ce8cb9524f542c0b",
|
|
||||||
[
|
|
||||||
null,
|
|
||||||
{}
|
|
||||||
]
|
|
||||||
],
|
|
||||||
"structuredclone_0.html": [
|
"structuredclone_0.html": [
|
||||||
"c8a6d38393c0217447992d47c994942e873e70ad",
|
"c8a6d38393c0217447992d47c994942e873e70ad",
|
||||||
[
|
[
|
||||||
|
@ -467167,7 +467295,7 @@
|
||||||
},
|
},
|
||||||
"installedapp": {
|
"installedapp": {
|
||||||
"idlharness.https.window.js": [
|
"idlharness.https.window.js": [
|
||||||
"3988dba414aabb69ff72d28642d84d89544e63dc",
|
"7774da6803d40031ee9b45f4d0a6bb42f51d4e3d",
|
||||||
[
|
[
|
||||||
"installedapp/idlharness.https.window.html",
|
"installedapp/idlharness.https.window.html",
|
||||||
{
|
{
|
||||||
|
@ -467183,8 +467311,13 @@
|
||||||
[
|
[
|
||||||
"script",
|
"script",
|
||||||
"/resources/idlharness.js"
|
"/resources/idlharness.js"
|
||||||
|
],
|
||||||
|
[
|
||||||
|
"timeout",
|
||||||
|
"long"
|
||||||
]
|
]
|
||||||
]
|
],
|
||||||
|
"timeout": "long"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
],
|
],
|
||||||
|
@ -467328,7 +467461,7 @@
|
||||||
]
|
]
|
||||||
],
|
],
|
||||||
"isIntersecting-threshold.html": [
|
"isIntersecting-threshold.html": [
|
||||||
"106b65edd7525d089224ff3192f57614d6c58ed6",
|
"842c8e2c9f96deb5e6e167230fae2e32b9d5e779",
|
||||||
[
|
[
|
||||||
null,
|
null,
|
||||||
{}
|
{}
|
||||||
|
@ -490015,14 +490148,43 @@
|
||||||
},
|
},
|
||||||
"screen_enumeration": {
|
"screen_enumeration": {
|
||||||
"getScreens.tentative.https.window.js": [
|
"getScreens.tentative.https.window.js": [
|
||||||
"76223b7907cd09f971acd0166318d7eb84c84c98",
|
"f496282b01620f8b1d2d10c11e961f6fbb9dc56a",
|
||||||
[
|
[
|
||||||
"screen_enumeration/getScreens.tentative.https.window.html",
|
"screen_enumeration/getScreens.tentative.https.window.html",
|
||||||
{
|
{
|
||||||
"script_metadata": [
|
"script_metadata": [
|
||||||
[
|
[
|
||||||
"global",
|
"global",
|
||||||
"window,dedicatedworker,sharedworker,serviceworker"
|
"window"
|
||||||
|
],
|
||||||
|
[
|
||||||
|
"script",
|
||||||
|
"/resources/testdriver.js"
|
||||||
|
],
|
||||||
|
[
|
||||||
|
"script",
|
||||||
|
"/resources/testdriver-vendor.js"
|
||||||
|
]
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
],
|
||||||
|
"getScreens.values.https.html": [
|
||||||
|
"5ce54839deefc78a9da98f7283d71c55705281f8",
|
||||||
|
[
|
||||||
|
null,
|
||||||
|
{}
|
||||||
|
]
|
||||||
|
],
|
||||||
|
"screen_enumeration_permission.window.js": [
|
||||||
|
"00adbfc52acfceedc949093444f24f04f9dc1a27",
|
||||||
|
[
|
||||||
|
"screen_enumeration/screen_enumeration_permission.window.html",
|
||||||
|
{
|
||||||
|
"script_metadata": [
|
||||||
|
[
|
||||||
|
"global",
|
||||||
|
"window"
|
||||||
],
|
],
|
||||||
[
|
[
|
||||||
"script",
|
"script",
|
||||||
|
@ -514611,7 +514773,7 @@
|
||||||
]
|
]
|
||||||
],
|
],
|
||||||
"RTCPeerConnection-mandatory-getStats.https.html": [
|
"RTCPeerConnection-mandatory-getStats.https.html": [
|
||||||
"e48d133f464a9a1e9f2b17b3c6eb5f3c375cae34",
|
"5b0d59153dca428518ee510e01e1d4ffe87abf00",
|
||||||
[
|
[
|
||||||
null,
|
null,
|
||||||
{
|
{
|
||||||
|
@ -519782,10 +519944,10 @@
|
||||||
},
|
},
|
||||||
"webtransport": {
|
"webtransport": {
|
||||||
"quic": {
|
"quic": {
|
||||||
"client-indication.any.js": [
|
"client-indication.sub.any.js": [
|
||||||
"15baa5f8542cb2d1a1c73f03dca24dcd09cfc5f6",
|
"62f2f3fe4d22bd767db78650c1cc9dda2053e6ce",
|
||||||
[
|
[
|
||||||
"webtransport/quic/client-indication.any.html",
|
"webtransport/quic/client-indication.sub.any.html",
|
||||||
{
|
{
|
||||||
"quic": true,
|
"quic": true,
|
||||||
"script_metadata": [
|
"script_metadata": [
|
||||||
|
@ -519801,7 +519963,7 @@
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
[
|
[
|
||||||
"webtransport/quic/client-indication.any.worker.html",
|
"webtransport/quic/client-indication.sub.any.worker.html",
|
||||||
{
|
{
|
||||||
"quic": true,
|
"quic": true,
|
||||||
"script_metadata": [
|
"script_metadata": [
|
||||||
|
@ -520943,6 +521105,15 @@
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
"webxr": {
|
"webxr": {
|
||||||
|
"anchors": {
|
||||||
|
"ar_anchor_states.https.html": [
|
||||||
|
"907da06880e9fe7908a32afbf2ddcb642e174b41",
|
||||||
|
[
|
||||||
|
null,
|
||||||
|
{}
|
||||||
|
]
|
||||||
|
]
|
||||||
|
},
|
||||||
"ar-module": {
|
"ar-module": {
|
||||||
"idlharness.https.window.js": [
|
"idlharness.https.window.js": [
|
||||||
"51cc3c42808a66ddde083b8982317e8cdd961c71",
|
"51cc3c42808a66ddde083b8982317e8cdd961c71",
|
||||||
|
|
|
@ -1,4 +0,0 @@
|
||||||
[hit-test-floats-002.html]
|
|
||||||
[Hit test float]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
|
@ -0,0 +1,4 @@
|
||||||
|
[hit-test-floats-005.html]
|
||||||
|
[Miss clipped float]
|
||||||
|
expected: FAIL
|
||||||
|
|
|
@ -21,3 +21,6 @@
|
||||||
[test the top of layer]
|
[test the top of layer]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
[test some point of the element: top left corner]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
|
|
@ -0,0 +1,7 @@
|
||||||
|
[HTMLLinkElement-disabled-001.html]
|
||||||
|
[<link disabled> prevents the stylesheet from being in document.styleSheets (from parser)]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[HTMLLinkElement.disabled reflects the <link disabled> attribute, and behaves consistently]
|
||||||
|
expected: FAIL
|
||||||
|
|
|
@ -0,0 +1,4 @@
|
||||||
|
[HTMLLinkElement-disabled-002.html]
|
||||||
|
[HTMLLinkElement.disabled reflects the <link disabled> attribute, and behaves consistently, when the sheet is an alternate]
|
||||||
|
expected: FAIL
|
||||||
|
|
|
@ -0,0 +1,4 @@
|
||||||
|
[HTMLLinkElement-disabled-003.html]
|
||||||
|
[HTMLLinkElement.disabled's explicitly enabled state persists when disconnected and connected again]
|
||||||
|
expected: FAIL
|
||||||
|
|
|
@ -0,0 +1,4 @@
|
||||||
|
[HTMLLinkElement-disabled-004.html]
|
||||||
|
[HTMLLinkElement.disabled's explicitly enabled state doesn't persist on clones]
|
||||||
|
expected: FAIL
|
||||||
|
|
|
@ -0,0 +1,5 @@
|
||||||
|
[HTMLLinkElement-disabled-005.html]
|
||||||
|
expected: TIMEOUT
|
||||||
|
[HTMLLinkElement.disabled's explicitly enabled state persists regardless of rel]
|
||||||
|
expected: TIMEOUT
|
||||||
|
|
|
@ -0,0 +1,4 @@
|
||||||
|
[HTMLLinkElement-disabled-007.html]
|
||||||
|
[HTMLLinkElement.disabled setter sets the explicitly enabled state if toggled back and forth.]
|
||||||
|
expected: FAIL
|
||||||
|
|
|
@ -0,0 +1,2 @@
|
||||||
|
[HTMLLinkElement-disabled-alternate.html]
|
||||||
|
expected: FAIL
|
|
@ -1,2 +0,0 @@
|
||||||
[HTMLLinkElement-disabled-alternate.tentative.html]
|
|
||||||
expected: FAIL
|
|
|
@ -312,21 +312,18 @@
|
||||||
[fetch(): separate response Content-Type: text/plain ]
|
[fetch(): separate response Content-Type: text/plain ]
|
||||||
expected: NOTRUN
|
expected: NOTRUN
|
||||||
|
|
||||||
[<iframe>: combined response Content-Type: text/html;" \\" text/plain]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[<iframe>: separate response Content-Type: text/html;x=" text/plain]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[<iframe>: separate response Content-Type: text/html;" \\" text/plain]
|
[<iframe>: separate response Content-Type: text/html;" \\" text/plain]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[<iframe>: combined response Content-Type: */* text/html]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[<iframe>: separate response Content-Type: text/html;" text/plain]
|
[<iframe>: separate response Content-Type: text/html;" text/plain]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[<iframe>: separate response Content-Type: text/html */*]
|
[<iframe>: combined response Content-Type: text/html;" text/plain]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[<iframe>: separate response Content-Type: text/html */*;charset=gbk]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[<iframe>: combined response Content-Type: text/html;x=" text/plain]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
|
|
@ -59,6 +59,3 @@
|
||||||
[separate text/javascript;charset=windows-1252 error text/javascript]
|
[separate text/javascript;charset=windows-1252 error text/javascript]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[separate text/javascript error]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
|
|
|
@ -0,0 +1,4 @@
|
||||||
|
[traverse_the_history_2.html]
|
||||||
|
[Multiple history traversals, last would be aborted]
|
||||||
|
expected: FAIL
|
||||||
|
|
|
@ -0,0 +1,4 @@
|
||||||
|
[traverse_the_history_3.html]
|
||||||
|
[Multiple history traversals, last would be aborted]
|
||||||
|
expected: FAIL
|
||||||
|
|
|
@ -0,0 +1,2 @@
|
||||||
|
[cross-origin-objects-on-new-window.html]
|
||||||
|
expected: TIMEOUT
|
|
@ -1,5 +1,4 @@
|
||||||
[embedded-opener-remove-frame.html]
|
[embedded-opener-remove-frame.html]
|
||||||
expected: CRASH
|
|
||||||
[opener and "removed" embedded documents]
|
[opener and "removed" embedded documents]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
@ -7,5 +6,5 @@
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[opener of discarded auxiliary browsing context]
|
[opener of discarded auxiliary browsing context]
|
||||||
expected: TIMEOUT
|
expected: FAIL
|
||||||
|
|
||||||
|
|
|
@ -3780,3 +3780,9 @@
|
||||||
[HTMLSlotElement interface: operation assignedNodes(optional AssignedNodesOptions)]
|
[HTMLSlotElement interface: operation assignedNodes(optional AssignedNodesOptions)]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
[HTMLLinkElement interface: document.createElement("link") must inherit property "disabled" with the proper type]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[HTMLLinkElement interface: attribute disabled]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
|
|
@ -0,0 +1,5 @@
|
||||||
|
[window-domain-failure.https.sub.html]
|
||||||
|
expected: TIMEOUT
|
||||||
|
[SharedArrayBuffer and a same-origin-domain (but not same-origin) iframe]
|
||||||
|
expected: TIMEOUT
|
||||||
|
|
|
@ -1,4 +0,0 @@
|
||||||
[window-domain-success.https.sub.html]
|
|
||||||
[postMessaging to a same-origin-domain (but not same-origin) iframe allows them to see each others' modifications]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
|
@ -11,3 +11,6 @@
|
||||||
[postMessaging to a same-origin iframe via MessageChannel allows them to see each others' modifications]
|
[postMessaging to a same-origin iframe via MessageChannel allows them to see each others' modifications]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
[postMessaging to a same-site iframe via MessageChannel should fail]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
|
|
@ -1,4 +0,0 @@
|
||||||
[window-similar-but-cross-origin-success.https.sub.html]
|
|
||||||
[postMessaging to a not same-origin-domain, but similar origin, iframe allows them to see each others' modifications]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
|
@ -14,6 +14,3 @@
|
||||||
[Host element with delegatesFocus should support autofocus]
|
[Host element with delegatesFocus should support autofocus]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Non-HTMLElement should not support autofocus]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
|
|
|
@ -1,5 +1,5 @@
|
||||||
[iframe_sandbox_popups_escaping-2.html]
|
[iframe_sandbox_popups_escaping-2.html]
|
||||||
expected: TIMEOUT
|
expected: CRASH
|
||||||
[Check that popups from a sandboxed iframe escape the sandbox if\n allow-popups-to-escape-sandbox is used]
|
[Check that popups from a sandboxed iframe escape the sandbox if\n allow-popups-to-escape-sandbox is used]
|
||||||
expected: TIMEOUT
|
expected: TIMEOUT
|
||||||
|
|
||||||
|
|
|
@ -1,5 +1,6 @@
|
||||||
[iframe_sandbox_popups_nonescaping-1.html]
|
[iframe_sandbox_popups_nonescaping-1.html]
|
||||||
type: testharness
|
type: testharness
|
||||||
|
expected: TIMEOUT
|
||||||
[Check that popups from a sandboxed iframe do not escape the sandbox]
|
[Check that popups from a sandboxed iframe do not escape the sandbox]
|
||||||
expected: FAIL
|
expected: NOTRUN
|
||||||
|
|
||||||
|
|
|
@ -1,6 +1,6 @@
|
||||||
[iframe_sandbox_popups_nonescaping-2.html]
|
[iframe_sandbox_popups_nonescaping-2.html]
|
||||||
type: testharness
|
type: testharness
|
||||||
expected: CRASH
|
expected: TIMEOUT
|
||||||
[Check that popups from a sandboxed iframe do not escape the sandbox]
|
[Check that popups from a sandboxed iframe do not escape the sandbox]
|
||||||
expected: NOTRUN
|
expected: NOTRUN
|
||||||
|
|
||||||
|
|
|
@ -0,0 +1,4 @@
|
||||||
|
[form-double-submit-3.html]
|
||||||
|
[<button> should have the same double-submit protection as <input type=submit>]
|
||||||
|
expected: FAIL
|
||||||
|
|
|
@ -4,3 +4,6 @@
|
||||||
[The incumbent settings object while executing the compiled callback via Web IDL's invoke must be that of the node document]
|
[The incumbent settings object while executing the compiled callback via Web IDL's invoke must be that of the node document]
|
||||||
expected: TIMEOUT
|
expected: TIMEOUT
|
||||||
|
|
||||||
|
[The entry settings object while executing the compiled callback via Web IDL's invoke must be that of the node document]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
|
|
@ -1,10 +1,9 @@
|
||||||
[promise-job-entry.html]
|
[promise-job-entry.html]
|
||||||
expected: TIMEOUT
|
|
||||||
[Fulfillment handler on fulfilled promise]
|
[Fulfillment handler on fulfilled promise]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Rejection handler on pending-then-rejected promise]
|
[Rejection handler on pending-then-rejected promise]
|
||||||
expected: TIMEOUT
|
expected: FAIL
|
||||||
|
|
||||||
[Sanity check: this all works as expected with no promises involved]
|
[Sanity check: this all works as expected with no promises involved]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
@ -16,5 +15,5 @@
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Fulfillment handler on pending-then-fulfilled promise]
|
[Fulfillment handler on pending-then-fulfilled promise]
|
||||||
expected: TIMEOUT
|
expected: FAIL
|
||||||
|
|
||||||
|
|
|
@ -1,5 +0,0 @@
|
||||||
[017.html]
|
|
||||||
expected: TIMEOUT
|
|
||||||
[origin of the script that invoked the method, about:blank]
|
|
||||||
expected: TIMEOUT
|
|
||||||
|
|
|
@ -0,0 +1,10 @@
|
||||||
|
[ar_anchor_states.https.html]
|
||||||
|
[Anchor creation fails if the feature was not requested]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Anchor creation fails if the feature was requested but the session already ended]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Anchor creation succeeds if the feature was requested]
|
||||||
|
expected: FAIL
|
||||||
|
|
|
@ -3,6 +3,10 @@
|
||||||
// In order to use this function, please import testdriver.js and
|
// In order to use this function, please import testdriver.js and
|
||||||
// testdriver-vendor.js, and include a <body> element.
|
// testdriver-vendor.js, and include a <body> element.
|
||||||
async function waitForUserActivation() {
|
async function waitForUserActivation() {
|
||||||
|
if (window.opener) {
|
||||||
|
throw new Error(
|
||||||
|
"waitForUserActivation() only works in the top-level frame");
|
||||||
|
}
|
||||||
const loadedPromise = new Promise(resolve => {
|
const loadedPromise = new Promise(resolve => {
|
||||||
if(document.readyState == 'complete') {
|
if(document.readyState == 'complete') {
|
||||||
resolve();
|
resolve();
|
||||||
|
|
|
@ -0,0 +1,17 @@
|
||||||
|
// META: script=/resources/WebIDLParser.js
|
||||||
|
// META: script=/resources/idlharness.js
|
||||||
|
|
||||||
|
'use strict';
|
||||||
|
|
||||||
|
// https://wicg.github.io/compression/
|
||||||
|
|
||||||
|
idl_test(
|
||||||
|
['compression'],
|
||||||
|
[],
|
||||||
|
idl_array => {
|
||||||
|
idl_array.add_objects({
|
||||||
|
CompressionStream: ['new CompressionStream("deflate")'],
|
||||||
|
DecompressionStream: ['new DecompressionStream("deflate")'],
|
||||||
|
});
|
||||||
|
}
|
||||||
|
);
|
|
@ -68,7 +68,7 @@ function create_cookie(origin, name, value, extras) {
|
||||||
function set_prefixed_cookie_via_dom_test(options) {
|
function set_prefixed_cookie_via_dom_test(options) {
|
||||||
promise_test(t => {
|
promise_test(t => {
|
||||||
var name = options.prefix + "prefixtestcookie";
|
var name = options.prefix + "prefixtestcookie";
|
||||||
erase_cookie_from_js(name, options.paras);
|
erase_cookie_from_js(name, options.params);
|
||||||
t.add_cleanup(() => erase_cookie_from_js(name, options.params));
|
t.add_cleanup(() => erase_cookie_from_js(name, options.params));
|
||||||
var value = "" + Math.random();
|
var value = "" + Math.random();
|
||||||
document.cookie = name + "=" + value + ";" + options.params;
|
document.cookie = name + "=" + value + ";" + options.params;
|
||||||
|
@ -104,11 +104,17 @@ function set_prefixed_cookie_via_http_test(options) {
|
||||||
// SameSite-specific test helpers:
|
// SameSite-specific test helpers:
|
||||||
//
|
//
|
||||||
|
|
||||||
|
// status for "network" cookies.
|
||||||
window.SameSiteStatus = {
|
window.SameSiteStatus = {
|
||||||
CROSS_SITE: "cross-site",
|
CROSS_SITE: "cross-site",
|
||||||
LAX: "lax",
|
LAX: "lax",
|
||||||
STRICT: "strict"
|
STRICT: "strict"
|
||||||
};
|
};
|
||||||
|
// status for "document.cookie".
|
||||||
|
window.DomSameSiteStatus = {
|
||||||
|
CROSS_SITE: "cross-site",
|
||||||
|
SAME_SITE: "same-site",
|
||||||
|
};
|
||||||
|
|
||||||
const wait_for_message = (type, origin) => {
|
const wait_for_message = (type, origin) => {
|
||||||
return new Promise((resolve, reject) => {
|
return new Promise((resolve, reject) => {
|
||||||
|
@ -155,7 +161,7 @@ async function resetSameSiteCookies(origin, value) {
|
||||||
// Given an |expectedStatus| and |expectedValue|, assert the |cookies| contains the
|
// Given an |expectedStatus| and |expectedValue|, assert the |cookies| contains the
|
||||||
// proper set of cookie names and values, according to the legacy behavior where
|
// proper set of cookie names and values, according to the legacy behavior where
|
||||||
// unspecified SameSite attribute defaults to SameSite=None behavior.
|
// unspecified SameSite attribute defaults to SameSite=None behavior.
|
||||||
function verifySameSiteCookieStateLegacy(expectedStatus, expectedValue, cookies) {
|
function verifySameSiteCookieStateLegacy(expectedStatus, expectedValue, cookies, domCookieStatus) {
|
||||||
assert_equals(cookies["samesite_none"], expectedValue, "SameSite=None cookies are always sent.");
|
assert_equals(cookies["samesite_none"], expectedValue, "SameSite=None cookies are always sent.");
|
||||||
assert_equals(cookies["samesite_unspecified"], expectedValue, "Unspecified-SameSite cookies are always sent.");
|
assert_equals(cookies["samesite_unspecified"], expectedValue, "Unspecified-SameSite cookies are always sent.");
|
||||||
if (expectedStatus == SameSiteStatus.CROSS_SITE) {
|
if (expectedStatus == SameSiteStatus.CROSS_SITE) {
|
||||||
|
@ -170,14 +176,14 @@ function verifySameSiteCookieStateLegacy(expectedStatus, expectedValue, cookies)
|
||||||
}
|
}
|
||||||
|
|
||||||
if (cookies["domcookies"]) {
|
if (cookies["domcookies"]) {
|
||||||
verifyDocumentCookie(expectedStatus, expectedValue, cookies["domcookies"]);
|
verifyDocumentCookieLegacy(domCookieStatus, expectedValue, cookies["domcookies"]);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
// Same as above except this expects samesite_unspecified to act the same as
|
// Same as above except this expects samesite_unspecified to act the same as
|
||||||
// samesite_lax (which is the behavior expected when SameSiteByDefault is
|
// samesite_lax (which is the behavior expected when SameSiteByDefault is
|
||||||
// enabled).
|
// enabled).
|
||||||
function verifySameSiteCookieStateWithSameSiteByDefault(expectedStatus, expectedValue, cookies) {
|
function verifySameSiteCookieStateWithSameSiteByDefault(expectedStatus, expectedValue, cookies, domCookieStatus) {
|
||||||
assert_equals(cookies["samesite_none"], expectedValue, "SameSite=None cookies are always sent.");
|
assert_equals(cookies["samesite_none"], expectedValue, "SameSite=None cookies are always sent.");
|
||||||
if (expectedStatus == SameSiteStatus.CROSS_SITE) {
|
if (expectedStatus == SameSiteStatus.CROSS_SITE) {
|
||||||
assert_not_equals(cookies["samesite_strict"], expectedValue, "SameSite=Strict cookies are not sent with cross-site requests.");
|
assert_not_equals(cookies["samesite_strict"], expectedValue, "SameSite=Strict cookies are not sent with cross-site requests.");
|
||||||
|
@ -194,11 +200,11 @@ function verifySameSiteCookieStateWithSameSiteByDefault(expectedStatus, expected
|
||||||
}
|
}
|
||||||
|
|
||||||
if (cookies["domcookies"]) {
|
if (cookies["domcookies"]) {
|
||||||
verifyDocumentCookie(expectedStatus, expectedValue, cookies["domcookies"]);
|
verifyDocumentCookieWithSameSiteByDefault(domCookieStatus, expectedValue, cookies["domcookies"]);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
function verifyDocumentCookie(expectedStatus, expectedValue, domcookies) {
|
function verifyDocumentCookieLegacy(expectedStatus, expectedValue, domcookies) {
|
||||||
const cookies = domcookies.split(";")
|
const cookies = domcookies.split(";")
|
||||||
.map(cookie => cookie.trim().split("="))
|
.map(cookie => cookie.trim().split("="))
|
||||||
.reduce((obj, cookie) => {
|
.reduce((obj, cookie) => {
|
||||||
|
@ -206,10 +212,38 @@ function verifyDocumentCookie(expectedStatus, expectedValue, domcookies) {
|
||||||
return obj;
|
return obj;
|
||||||
}, {});
|
}, {});
|
||||||
|
|
||||||
|
if (expectedStatus == DomSameSiteStatus.SAME_SITE) {
|
||||||
assert_equals(cookies["samesite_none"], expectedValue, "SameSite=None cookies are always included in document.cookie.");
|
assert_equals(cookies["samesite_none"], expectedValue, "SameSite=None cookies are always included in document.cookie.");
|
||||||
assert_equals(cookies["samesite_unspecified"], expectedValue, "Unspecified-SameSite cookies are always included in document.cookie.");
|
assert_equals(cookies["samesite_unspecified"], expectedValue, "Unspecified-SameSite cookies are always included in document.cookie.");
|
||||||
assert_equals(cookies["samesite_strict"], expectedValue, "SameSite=Strict cookies are always included in document.cookie.");
|
assert_equals(cookies["samesite_strict"], expectedValue, "SameSite=Strict cookies are always included in document.cookie.");
|
||||||
assert_equals(cookies["samesite_lax"], expectedValue, "SameSite=Lax cookies are always included in document.cookie.");
|
assert_equals(cookies["samesite_lax"], expectedValue, "SameSite=Lax cookies are always included in document.cookie.");
|
||||||
|
} else if (expectedStatus == DomSameSiteStatus.CROSS_SITE) {
|
||||||
|
assert_equals(cookies["samesite_none"], expectedValue, "SameSite=None cookies are always included in document.cookie.");
|
||||||
|
assert_equals(cookies["samesite_unspecified"], expectedValue, "Unspecified-SameSite cookies are always included in document.cookie.");
|
||||||
|
assert_not_equals(cookies["samesite_strict"], expectedValue, "SameSite=Strict cookies are not included in document.cookie when cross-site.");
|
||||||
|
assert_not_equals(cookies["samesite_lax"], expectedValue, "SameSite=Lax cookies are not included in document.cookie when cross-site.");
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
function verifyDocumentCookieWithSameSiteByDefault(expectedStatus, expectedValue, domcookies) {
|
||||||
|
const cookies = domcookies.split(";")
|
||||||
|
.map(cookie => cookie.trim().split("="))
|
||||||
|
.reduce((obj, cookie) => {
|
||||||
|
obj[cookie[0]] = cookie[1];
|
||||||
|
return obj;
|
||||||
|
}, {});
|
||||||
|
|
||||||
|
if (expectedStatus == DomSameSiteStatus.SAME_SITE) {
|
||||||
|
assert_equals(cookies["samesite_none"], expectedValue, "SameSite=None cookies are always included in document.cookie.");
|
||||||
|
assert_equals(cookies["samesite_unspecified"], expectedValue, "Unspecified-SameSite cookies are always included in document.cookie.");
|
||||||
|
assert_equals(cookies["samesite_strict"], expectedValue, "SameSite=Strict cookies are always included in document.cookie.");
|
||||||
|
assert_equals(cookies["samesite_lax"], expectedValue, "SameSite=Lax cookies are always included in document.cookie.");
|
||||||
|
} else if (expectedStatus == DomSameSiteStatus.CROSS_SITE) {
|
||||||
|
assert_equals(cookies["samesite_none"], expectedValue, "SameSite=None cookies are always included in document.cookie.");
|
||||||
|
assert_not_equals(cookies["samesite_unspecified"], expectedValue, "Unspecified-SameSite cookies are not included in document.cookie when cross-site.");
|
||||||
|
assert_not_equals(cookies["samesite_strict"], expectedValue, "SameSite=Strict cookies are not included in document.cookie when cross-site.");
|
||||||
|
assert_not_equals(cookies["samesite_lax"], expectedValue, "SameSite=Lax cookies are not included in document.cookie when cross-site.");
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
function isLegacySameSite() {
|
function isLegacySameSite() {
|
||||||
|
|
|
@ -15,7 +15,7 @@
|
||||||
return credFetch(target + "/cookies/resources/list.py")
|
return credFetch(target + "/cookies/resources/list.py")
|
||||||
|
|
||||||
.then(r => r.json())
|
.then(r => r.json())
|
||||||
.then(cookies => getSameSiteVerifier()(expectedStatus, value, cookies));
|
.then(cookies => getSameSiteVerifier()(expectedStatus, value, cookies, DomSameSiteStatus.SAME_SITE));
|
||||||
});
|
});
|
||||||
}, title);
|
}, title);
|
||||||
}
|
}
|
||||||
|
|
|
@ -30,7 +30,7 @@
|
||||||
var reloaded = false;
|
var reloaded = false;
|
||||||
var msgHandler = e => {
|
var msgHandler = e => {
|
||||||
try {
|
try {
|
||||||
getSameSiteVerifier()(expectedStatus, value, e.data);
|
getSameSiteVerifier()(expectedStatus, value, e.data, DomSameSiteStatus.SAME_SITE);
|
||||||
} catch (e) {
|
} catch (e) {
|
||||||
reject(e);
|
reject(e);
|
||||||
}
|
}
|
||||||
|
|
|
@ -33,7 +33,7 @@
|
||||||
window.removeEventListener("message", msgHandler);
|
window.removeEventListener("message", msgHandler);
|
||||||
e.source.close();
|
e.source.close();
|
||||||
try {
|
try {
|
||||||
getSameSiteVerifier()(expectedStatus, value, e.data);
|
getSameSiteVerifier()(expectedStatus, value, e.data, DomSameSiteStatus.SAME_SITE);
|
||||||
resolve("Popup received the cookie.");
|
resolve("Popup received the cookie.");
|
||||||
} catch (e) {
|
} catch (e) {
|
||||||
reject(e);
|
reject(e);
|
||||||
|
|
|
@ -20,7 +20,7 @@
|
||||||
var reloaded = false;
|
var reloaded = false;
|
||||||
var msgHandler = e => {
|
var msgHandler = e => {
|
||||||
try {
|
try {
|
||||||
getSameSiteVerifier()(expectedStatus, value, e.data);
|
getSameSiteVerifier()(expectedStatus, value, e.data, DomSameSiteStatus.SAME_SITE);
|
||||||
} catch (e) {
|
} catch (e) {
|
||||||
reject(e);
|
reject(e);
|
||||||
}
|
}
|
||||||
|
|
|
@ -22,7 +22,7 @@
|
||||||
window.removeEventListener("message", msgHandler);
|
window.removeEventListener("message", msgHandler);
|
||||||
e.source.close();
|
e.source.close();
|
||||||
try {
|
try {
|
||||||
getSameSiteVerifier()(expectedStatus, value, e.data);
|
getSameSiteVerifier()(expectedStatus, value, e.data, DomSameSiteStatus.SAME_SITE);
|
||||||
resolve("Popup received the cookie.");
|
resolve("Popup received the cookie.");
|
||||||
} catch (e) {
|
} catch (e) {
|
||||||
reject(e);
|
reject(e);
|
||||||
|
|
|
@ -9,7 +9,7 @@
|
||||||
<!-- We're appending an <iframe> to the document's body, so execute tests after we have a body -->
|
<!-- We're appending an <iframe> to the document's body, so execute tests after we have a body -->
|
||||||
<body>
|
<body>
|
||||||
<script>
|
<script>
|
||||||
function create_test(origin, target, expectedStatus, title) {
|
function create_test(origin, target, expectedStatus, expectedDomStatus, title) {
|
||||||
promise_test(t => {
|
promise_test(t => {
|
||||||
var value = "" + Math.random();
|
var value = "" + Math.random();
|
||||||
return resetSameSiteCookies(origin, value)
|
return resetSameSiteCookies(origin, value)
|
||||||
|
@ -21,7 +21,7 @@
|
||||||
var reloaded = false;
|
var reloaded = false;
|
||||||
var msgHandler = e => {
|
var msgHandler = e => {
|
||||||
try {
|
try {
|
||||||
getSameSiteVerifier()(expectedStatus, value, e.data);
|
getSameSiteVerifier()(expectedStatus, value, e.data, expectedDomStatus);
|
||||||
} catch (e) {
|
} catch (e) {
|
||||||
reject(e);
|
reject(e);
|
||||||
}
|
}
|
||||||
|
@ -44,7 +44,7 @@
|
||||||
}, title);
|
}, title);
|
||||||
}
|
}
|
||||||
|
|
||||||
create_test(SECURE_ORIGIN, SECURE_ORIGIN, SameSiteStatus.STRICT, "Reloaded same-host fetches are strictly same-site");
|
create_test(SECURE_ORIGIN, SECURE_ORIGIN, SameSiteStatus.STRICT, DomSameSiteStatus.SAME_SITE, "Reloaded same-host fetches are strictly same-site");
|
||||||
create_test(SECURE_SUBDOMAIN_ORIGIN, SECURE_SUBDOMAIN_ORIGIN, SameSiteStatus.STRICT, "Reloaded subdomain fetches are strictly same-site");
|
create_test(SECURE_SUBDOMAIN_ORIGIN, SECURE_SUBDOMAIN_ORIGIN, SameSiteStatus.STRICT, DomSameSiteStatus.SAME_SITE, "Reloaded subdomain fetches are strictly same-site");
|
||||||
create_test(SECURE_CROSS_SITE_ORIGIN, SECURE_CROSS_SITE_ORIGIN, SameSiteStatus.CROSS_SITE, "Reloaded cross-site fetches are cross-site");
|
create_test(SECURE_CROSS_SITE_ORIGIN, SECURE_CROSS_SITE_ORIGIN, SameSiteStatus.CROSS_SITE, DomSameSiteStatus.CROSS_SITE, "Reloaded cross-site fetches are cross-site");
|
||||||
</script>
|
</script>
|
||||||
|
|
|
@ -0,0 +1,57 @@
|
||||||
|
<!DOCTYPE html>
|
||||||
|
<meta charset="utf-8"/>
|
||||||
|
<meta name="timeout" content="long">
|
||||||
|
<script src="/resources/testharness.js"></script>
|
||||||
|
<script src="/resources/testharnessreport.js"></script>
|
||||||
|
<script src="/cookies/resources/cookie-helper.sub.js"></script>
|
||||||
|
<!-- We're appending an <iframe> to the document's body, so execute tests after we have a body -->
|
||||||
|
<body>
|
||||||
|
<script>
|
||||||
|
function create_test(target, expectedDomStatus, title) {
|
||||||
|
promise_test(async t => {
|
||||||
|
let cookieValue = await new Promise((resolve, reject) => {
|
||||||
|
var iframe = document.createElement("iframe");
|
||||||
|
|
||||||
|
window.onmessage = t.step_func(e => {
|
||||||
|
if (e.source == iframe.contentWindow) {
|
||||||
|
document.body.removeChild(iframe);
|
||||||
|
resolve(e.data.value);
|
||||||
|
}
|
||||||
|
});
|
||||||
|
|
||||||
|
iframe.src = target + "/cookies/samesite/resources/iframe.document.html";
|
||||||
|
document.body.appendChild(iframe);
|
||||||
|
});
|
||||||
|
|
||||||
|
await new Promise((resolve, reject) => {
|
||||||
|
var iframe = document.createElement("iframe");
|
||||||
|
|
||||||
|
window.onmessage = t.step_func(e => {
|
||||||
|
if (e.source == iframe.contentWindow) {
|
||||||
|
// Cleanup, then verify cookie state:
|
||||||
|
document.body.removeChild(iframe);
|
||||||
|
|
||||||
|
const cookies = e.data;
|
||||||
|
assert_equals(cookies["dc_samesite_none"], cookieValue, "SameSite=none cookies can be set via document.cookies even by cross-origin documents");
|
||||||
|
|
||||||
|
if (expectedDomStatus === DomSameSiteStatus.SAME_SITE) {
|
||||||
|
assert_equals(cookies["dc_samesite_lax"], cookieValue, "SameSite=lax cookies can be set via document.cookies by same-site documents");
|
||||||
|
assert_equals(cookies["dc_samesite_strict"], cookieValue, "SameSite=strict cookies can be set via document.cookies by same-site documents");
|
||||||
|
} else if (expectedDomStatus === DomSameSiteStatus.CROSS_SITE) {
|
||||||
|
assert_not_equals(cookies["dc_samesite_lax"], cookieValue, "SameSite=lax cookies can be set via document.cookies by same-site documents");
|
||||||
|
assert_not_equals(cookies["dc_samesite_strict"], cookieValue, "SameSite=strict cookies can be set via document.cookies by same-site documents");
|
||||||
|
}
|
||||||
|
|
||||||
|
resolve();
|
||||||
|
}
|
||||||
|
});
|
||||||
|
|
||||||
|
iframe.src = target + "/cookies/resources/postToParent.py";
|
||||||
|
document.body.appendChild(iframe);
|
||||||
|
});
|
||||||
|
}, title);
|
||||||
|
}
|
||||||
|
|
||||||
|
create_test(SECURE_ORIGIN, DomSameSiteStatus.SAME_SITE, "Same-site iframes can set lax/strict cookies via document.cookie");
|
||||||
|
create_test(SECURE_CROSS_SITE_ORIGIN, DomSameSiteStatus.CROSS_SITE, "Cross-site iframe cannot set lax/strict cookies via document.cookie");
|
||||||
|
</script>
|
|
@ -9,7 +9,7 @@
|
||||||
<!-- We're appending an <iframe> to the document's body, so execute tests after we have a body -->
|
<!-- We're appending an <iframe> to the document's body, so execute tests after we have a body -->
|
||||||
<body>
|
<body>
|
||||||
<script>
|
<script>
|
||||||
function create_test(origin, target, expectedStatus, title) {
|
function create_test(origin, target, expectedStatus, expectedDomStatus, title) {
|
||||||
promise_test(t => {
|
promise_test(t => {
|
||||||
var value = "" + Math.random();
|
var value = "" + Math.random();
|
||||||
return resetSameSiteCookies(origin, value)
|
return resetSameSiteCookies(origin, value)
|
||||||
|
@ -24,7 +24,7 @@
|
||||||
document.body.removeChild(iframe);
|
document.body.removeChild(iframe);
|
||||||
window.removeEventListener("message", msgHandler);
|
window.removeEventListener("message", msgHandler);
|
||||||
try {
|
try {
|
||||||
getSameSiteVerifier()(expectedStatus, value, e.data);
|
getSameSiteVerifier()(expectedStatus, value, e.data, expectedDomStatus);
|
||||||
resolve();
|
resolve();
|
||||||
} catch(e) {
|
} catch(e) {
|
||||||
reject(e);
|
reject(e);
|
||||||
|
@ -41,22 +41,22 @@
|
||||||
}
|
}
|
||||||
|
|
||||||
// No redirect:
|
// No redirect:
|
||||||
create_test(SECURE_ORIGIN, SECURE_ORIGIN, SameSiteStatus.STRICT, "Same-host fetches are strictly same-site");
|
create_test(SECURE_ORIGIN, SECURE_ORIGIN, SameSiteStatus.STRICT, DomSameSiteStatus.SAME_SITE, "Same-host fetches are strictly same-site");
|
||||||
create_test(SECURE_SUBDOMAIN_ORIGIN, SECURE_SUBDOMAIN_ORIGIN, SameSiteStatus.STRICT, "Subdomain fetches are strictly same-site");
|
create_test(SECURE_SUBDOMAIN_ORIGIN, SECURE_SUBDOMAIN_ORIGIN, SameSiteStatus.STRICT, DomSameSiteStatus.SAME_SITE, "Subdomain fetches are strictly same-site");
|
||||||
create_test(SECURE_CROSS_SITE_ORIGIN, SECURE_CROSS_SITE_ORIGIN, SameSiteStatus.CROSS_SITE, "Cross-site fetches are cross-site");
|
create_test(SECURE_CROSS_SITE_ORIGIN, SECURE_CROSS_SITE_ORIGIN, SameSiteStatus.CROSS_SITE, DomSameSiteStatus.CROSS_SITE, "Cross-site fetches are cross-site");
|
||||||
|
|
||||||
// Redirect from {same-host,subdomain,cross-site} to same-host:
|
// Redirect from {same-host,subdomain,cross-site} to same-host:
|
||||||
create_test(SECURE_ORIGIN, redirectTo(SECURE_ORIGIN, SECURE_ORIGIN), SameSiteStatus.STRICT, "Same-host redirecting to same-host fetches are strictly same-site");
|
create_test(SECURE_ORIGIN, redirectTo(SECURE_ORIGIN, SECURE_ORIGIN), SameSiteStatus.STRICT, DomSameSiteStatus.SAME_SITE, "Same-host redirecting to same-host fetches are strictly same-site");
|
||||||
create_test(SECURE_ORIGIN, redirectTo(SECURE_SUBDOMAIN_ORIGIN, SECURE_ORIGIN), SameSiteStatus.STRICT, "Subdomain redirecting to same-host fetches are strictly same-site");
|
create_test(SECURE_ORIGIN, redirectTo(SECURE_SUBDOMAIN_ORIGIN, SECURE_ORIGIN), SameSiteStatus.STRICT, DomSameSiteStatus.SAME_SITE, "Subdomain redirecting to same-host fetches are strictly same-site");
|
||||||
create_test(SECURE_ORIGIN, redirectTo(SECURE_CROSS_SITE_ORIGIN, SECURE_ORIGIN), SameSiteStatus.STRICT, "Cross-site redirecting to same-host fetches are strictly same-site");
|
create_test(SECURE_ORIGIN, redirectTo(SECURE_CROSS_SITE_ORIGIN, SECURE_ORIGIN), SameSiteStatus.STRICT, DomSameSiteStatus.SAME_SITE, "Cross-site redirecting to same-host fetches are strictly same-site");
|
||||||
|
|
||||||
// Redirect from {same-host,subdomain,cross-site} to same-host:
|
// Redirect from {same-host,subdomain,cross-site} to same-host:
|
||||||
create_test(SECURE_SUBDOMAIN_ORIGIN, redirectTo(SECURE_ORIGIN, SECURE_SUBDOMAIN_ORIGIN), SameSiteStatus.STRICT, "Same-host redirecting to subdomain fetches are strictly same-site");
|
create_test(SECURE_SUBDOMAIN_ORIGIN, redirectTo(SECURE_ORIGIN, SECURE_SUBDOMAIN_ORIGIN), SameSiteStatus.STRICT, DomSameSiteStatus.SAME_SITE, "Same-host redirecting to subdomain fetches are strictly same-site");
|
||||||
create_test(SECURE_SUBDOMAIN_ORIGIN, redirectTo(SECURE_SUBDOMAIN_ORIGIN, SECURE_SUBDOMAIN_ORIGIN), SameSiteStatus.STRICT, "Subdomain redirecting to subdomain fetches are strictly same-site");
|
create_test(SECURE_SUBDOMAIN_ORIGIN, redirectTo(SECURE_SUBDOMAIN_ORIGIN, SECURE_SUBDOMAIN_ORIGIN), SameSiteStatus.STRICT, DomSameSiteStatus.SAME_SITE, "Subdomain redirecting to subdomain fetches are strictly same-site");
|
||||||
create_test(SECURE_SUBDOMAIN_ORIGIN, redirectTo(SECURE_CROSS_SITE_ORIGIN, SECURE_SUBDOMAIN_ORIGIN), SameSiteStatus.STRICT, "Cross-site redirecting to subdomain fetches are strictly same-site");
|
create_test(SECURE_SUBDOMAIN_ORIGIN, redirectTo(SECURE_CROSS_SITE_ORIGIN, SECURE_SUBDOMAIN_ORIGIN), SameSiteStatus.STRICT, DomSameSiteStatus.SAME_SITE, "Cross-site redirecting to subdomain fetches are strictly same-site");
|
||||||
|
|
||||||
// Redirect from {same-host,subdomain,cross-site} to cross-site:
|
// Redirect from {same-host,subdomain,cross-site} to cross-site:
|
||||||
create_test(SECURE_CROSS_SITE_ORIGIN, redirectTo(SECURE_ORIGIN, SECURE_CROSS_SITE_ORIGIN), SameSiteStatus.CROSS_SITE, "Same-host redirecting to cross-site fetches are cross-site");
|
create_test(SECURE_CROSS_SITE_ORIGIN, redirectTo(SECURE_ORIGIN, SECURE_CROSS_SITE_ORIGIN), SameSiteStatus.CROSS_SITE, DomSameSiteStatus.CROSS_SITE, "Same-host redirecting to cross-site fetches are cross-site");
|
||||||
create_test(SECURE_CROSS_SITE_ORIGIN, redirectTo(SECURE_SUBDOMAIN_ORIGIN, SECURE_CROSS_SITE_ORIGIN), SameSiteStatus.CROSS_SITE, "Subdomain redirecting to cross-site fetches are cross-site");
|
create_test(SECURE_CROSS_SITE_ORIGIN, redirectTo(SECURE_SUBDOMAIN_ORIGIN, SECURE_CROSS_SITE_ORIGIN), SameSiteStatus.CROSS_SITE, DomSameSiteStatus.CROSS_SITE, "Subdomain redirecting to cross-site fetches are cross-site");
|
||||||
create_test(SECURE_CROSS_SITE_ORIGIN, redirectTo(SECURE_CROSS_SITE_ORIGIN, SECURE_CROSS_SITE_ORIGIN), SameSiteStatus.CROSS_SITE, "Cross-site redirecting to cross-site fetches are cross-site");
|
create_test(SECURE_CROSS_SITE_ORIGIN, redirectTo(SECURE_CROSS_SITE_ORIGIN, SECURE_CROSS_SITE_ORIGIN), SameSiteStatus.CROSS_SITE, DomSameSiteStatus.CROSS_SITE, "Cross-site redirecting to cross-site fetches are cross-site");
|
||||||
</script>
|
</script>
|
||||||
|
|
|
@ -0,0 +1,8 @@
|
||||||
|
<!DOCTYPE html>
|
||||||
|
<script>
|
||||||
|
var value = "" + Math.random();
|
||||||
|
document.cookie = `dc_samesite_strict=${value}; secure; sameSite=strict; path=/`;
|
||||||
|
document.cookie = `dc_samesite_lax=${value}; secure; sameSite=lax; path=/`;
|
||||||
|
document.cookie = `dc_samesite_none=${value}; secure; sameSite=none; path=/`;
|
||||||
|
parent.postMessage({value}, "*");
|
||||||
|
</script>
|
|
@ -17,7 +17,7 @@
|
||||||
var reloaded = false;
|
var reloaded = false;
|
||||||
var msgHandler = e => {
|
var msgHandler = e => {
|
||||||
try {
|
try {
|
||||||
getSameSiteVerifier()(expectedStatus, value, e.data);
|
getSameSiteVerifier()(expectedStatus, value, e.data, DomSameSiteStatus.SAME_SITE);
|
||||||
} catch (e) {
|
} catch (e) {
|
||||||
reject(e);
|
reject(e);
|
||||||
}
|
}
|
||||||
|
|
|
@ -19,7 +19,7 @@
|
||||||
window.removeEventListener("message", msgHandler);
|
window.removeEventListener("message", msgHandler);
|
||||||
w.close();
|
w.close();
|
||||||
try {
|
try {
|
||||||
getSameSiteVerifier()(expectedStatus, value, e.data);
|
getSameSiteVerifier()(expectedStatus, value, e.data, DomSameSiteStatus.SAME_SITE);
|
||||||
resolve("Popup received the cookie.");
|
resolve("Popup received the cookie.");
|
||||||
} catch (e) {
|
} catch (e) {
|
||||||
reject(e);
|
reject(e);
|
||||||
|
|
|
@ -0,0 +1,18 @@
|
||||||
|
<!DOCTYPE html>
|
||||||
|
<style>
|
||||||
|
#target {
|
||||||
|
width: 220px;
|
||||||
|
height: 120px;
|
||||||
|
overflow: scroll;
|
||||||
|
}
|
||||||
|
#inner {
|
||||||
|
padding: 10px;
|
||||||
|
box-shadow: 10px 10px green inset;
|
||||||
|
height: 120px;
|
||||||
|
}
|
||||||
|
</style>
|
||||||
|
<div id="target">
|
||||||
|
<div id="inner">
|
||||||
|
Passes if green inset shadow is visible.
|
||||||
|
</div>
|
||||||
|
</div>
|
|
@ -0,0 +1,21 @@
|
||||||
|
<!DOCTYPE html>
|
||||||
|
<link rel="help" href="http://www.w3.org/TR/css3-background/#the-box-shadow">
|
||||||
|
<link rel="match" href="inset-box-shadow-scroll-ref.html"/>
|
||||||
|
<style>
|
||||||
|
#target {
|
||||||
|
width: 200px;
|
||||||
|
height: 100px;
|
||||||
|
overflow: scroll;
|
||||||
|
background-color: white;
|
||||||
|
box-shadow: 10px 10px green inset;
|
||||||
|
padding: 10px;
|
||||||
|
}
|
||||||
|
#inner {
|
||||||
|
height: 120px;
|
||||||
|
}
|
||||||
|
</style>
|
||||||
|
<div id="target">
|
||||||
|
<div id="inner">
|
||||||
|
Passes if green inset shadow is visible.
|
||||||
|
</div>
|
||||||
|
</div>
|
|
@ -0,0 +1,23 @@
|
||||||
|
<!DOCTYPE html>
|
||||||
|
<link rel="help" href="http://www.w3.org/TR/css3-background/#the-box-shadow">
|
||||||
|
<link rel="match" href="inset-box-shadow-scroll-ref.html"/>
|
||||||
|
<style>
|
||||||
|
#target {
|
||||||
|
position: absolute;
|
||||||
|
z-index: 1;
|
||||||
|
width: 200px;
|
||||||
|
height: 100px;
|
||||||
|
overflow: scroll;
|
||||||
|
background-color: white;
|
||||||
|
box-shadow: 10px 10px green inset;
|
||||||
|
padding: 10px;
|
||||||
|
}
|
||||||
|
#inner {
|
||||||
|
height: 120px;
|
||||||
|
}
|
||||||
|
</style>
|
||||||
|
<div id="target">
|
||||||
|
<div id="inner">
|
||||||
|
Passes if green inset shadow is visible.
|
||||||
|
</div>
|
||||||
|
</div>
|
|
@ -20,6 +20,9 @@ test_computed_value("aspect-ratio", "16.3 / 9.5");
|
||||||
test_computed_value("aspect-ratio", "16/9", "16 / 9");
|
test_computed_value("aspect-ratio", "16/9", "16 / 9");
|
||||||
test_computed_value("aspect-ratio", "0 / 9");
|
test_computed_value("aspect-ratio", "0 / 9");
|
||||||
test_computed_value("aspect-ratio", "16 / 0");
|
test_computed_value("aspect-ratio", "16 / 0");
|
||||||
|
test_computed_value("aspect-ratio", "auto 1");
|
||||||
|
test_computed_value("aspect-ratio", "auto 1 / 1", "auto 1");
|
||||||
|
test_computed_value("aspect-ratio", "0 auto", "auto 0");
|
||||||
// The computed value of a <ratio> is the pair of numbers provided, unless
|
// The computed value of a <ratio> is the pair of numbers provided, unless
|
||||||
// both numbers are zero, in which case the computed value is the pair (1, 0)
|
// both numbers are zero, in which case the computed value is the pair (1, 0)
|
||||||
// (same as 1 / 0).
|
// (same as 1 / 0).
|
||||||
|
|
|
@ -13,6 +13,6 @@ test_invalid_value("aspect-ratio", "auto / 16");
|
||||||
test_invalid_value("aspect-ratio", "16 9");
|
test_invalid_value("aspect-ratio", "16 9");
|
||||||
test_invalid_value("aspect-ratio", "16px / 9px");
|
test_invalid_value("aspect-ratio", "16px / 9px");
|
||||||
test_invalid_value("aspect-ratio", "16 / -9");
|
test_invalid_value("aspect-ratio", "16 / -9");
|
||||||
test_invalid_value("aspect-ratio", "1 auto");
|
test_invalid_value("aspect-ratio", "1 invalid");
|
||||||
test_invalid_value("aspect-ratio", "1.5 auto");
|
test_invalid_value("aspect-ratio", "invalid 1.5");
|
||||||
</script>
|
</script>
|
||||||
|
|
|
@ -19,6 +19,8 @@ test_valid_value("aspect-ratio", "16 /9", "16 / 9");
|
||||||
test_valid_value("aspect-ratio", "16/ 9", "16 / 9");
|
test_valid_value("aspect-ratio", "16/ 9", "16 / 9");
|
||||||
test_valid_value("aspect-ratio", "0 / 9");
|
test_valid_value("aspect-ratio", "0 / 9");
|
||||||
test_valid_value("aspect-ratio", "16 / 0");
|
test_valid_value("aspect-ratio", "16 / 0");
|
||||||
|
test_valid_value("aspect-ratio", "auto 16");
|
||||||
|
test_valid_value("aspect-ratio", "16 auto", "auto 16");
|
||||||
// https://github.com/w3c/csswg-drafts/issues/5084
|
// https://github.com/w3c/csswg-drafts/issues/5084
|
||||||
test_valid_value("aspect-ratio", "0 / 0", "1 / 0");
|
test_valid_value("aspect-ratio", "0 / 0", "1 / 0");
|
||||||
</script>
|
</script>
|
||||||
|
|
|
@ -0,0 +1,9 @@
|
||||||
|
<!DOCTYPE html>
|
||||||
|
<link rel="help" href="https://crbug.com/903224">
|
||||||
|
<link rel="match" href="../reference/ref-filled-green-100px-square.xht">
|
||||||
|
<meta name="assert" content="A positioned absolute table should resolve its %-height against its containing block.">
|
||||||
|
<p>Test passes if there is a filled green square and <strong>no red</strong>.</p>
|
||||||
|
<div style="position:relative; width:100px;">
|
||||||
|
<div style="position:absolute; display:table; width:100%; height:100%; background:green;"></div>
|
||||||
|
<div style="height:100px; background:red;"></div>
|
||||||
|
</div>
|
|
@ -2,8 +2,7 @@
|
||||||
<title><link disabled>, HTMLLinkElement.disabled and CSSStyleSheet.disabled interactions</title>
|
<title><link disabled>, HTMLLinkElement.disabled and CSSStyleSheet.disabled interactions</title>
|
||||||
<link rel="author" title="Emilio Cobos Álvarez" href="mailto:emilio@crisal.io">
|
<link rel="author" title="Emilio Cobos Álvarez" href="mailto:emilio@crisal.io">
|
||||||
<link rel="author" title="Mozilla" href="https://mozilla.org">
|
<link rel="author" title="Mozilla" href="https://mozilla.org">
|
||||||
<link rel="help" href="https://bugzilla.mozilla.org/show_bug.cgi?id=1281135">
|
<link rel="help" href="https://html.spec.whatwg.org/#attr-link-disabled">
|
||||||
<link rel="help" href="https://github.com/whatwg/html/issues/3840">
|
|
||||||
<script src="/resources/testharness.js"></script>
|
<script src="/resources/testharness.js"></script>
|
||||||
<script src="/resources/testharnessreport.js"></script>
|
<script src="/resources/testharnessreport.js"></script>
|
||||||
<link title="alt" rel="stylesheet" disabled href="data:text/css,html { background: green }">
|
<link title="alt" rel="stylesheet" disabled href="data:text/css,html { background: green }">
|
|
@ -2,8 +2,7 @@
|
||||||
<title><link disabled>, HTMLLinkElement.disabled and CSSStyleSheet.disabled interactions (alternate)</title>
|
<title><link disabled>, HTMLLinkElement.disabled and CSSStyleSheet.disabled interactions (alternate)</title>
|
||||||
<link rel="author" title="Emilio Cobos Álvarez" href="mailto:emilio@crisal.io">
|
<link rel="author" title="Emilio Cobos Álvarez" href="mailto:emilio@crisal.io">
|
||||||
<link rel="author" title="Mozilla" href="https://mozilla.org">
|
<link rel="author" title="Mozilla" href="https://mozilla.org">
|
||||||
<link rel="help" href="https://bugzilla.mozilla.org/show_bug.cgi?id=1281135">
|
<link rel="help" href="https://html.spec.whatwg.org/#attr-link-disabled">
|
||||||
<link rel="help" href="https://github.com/whatwg/html/issues/3840">
|
|
||||||
<script src="/resources/testharness.js"></script>
|
<script src="/resources/testharness.js"></script>
|
||||||
<script src="/resources/testharnessreport.js"></script>
|
<script src="/resources/testharnessreport.js"></script>
|
||||||
<link title="alt" rel="alternate stylesheet" disabled href="data:text/css,html { background: green }">
|
<link title="alt" rel="alternate stylesheet" disabled href="data:text/css,html { background: green }">
|
|
@ -2,8 +2,7 @@
|
||||||
<title><link disabled>'s "explicitly enabled" state persists after getting disconnected from the tree</title>
|
<title><link disabled>'s "explicitly enabled" state persists after getting disconnected from the tree</title>
|
||||||
<link rel="author" title="Emilio Cobos Álvarez" href="mailto:emilio@crisal.io">
|
<link rel="author" title="Emilio Cobos Álvarez" href="mailto:emilio@crisal.io">
|
||||||
<link rel="author" title="Mozilla" href="https://mozilla.org">
|
<link rel="author" title="Mozilla" href="https://mozilla.org">
|
||||||
<link rel="help" href="https://bugzilla.mozilla.org/show_bug.cgi?id=1281135">
|
<link rel="help" href="https://html.spec.whatwg.org/#attr-link-disabled">
|
||||||
<link rel="help" href="https://github.com/whatwg/html/issues/3840">
|
|
||||||
<script src="/resources/testharness.js"></script>
|
<script src="/resources/testharness.js"></script>
|
||||||
<script src="/resources/testharnessreport.js"></script>
|
<script src="/resources/testharnessreport.js"></script>
|
||||||
<link title="alt" rel="alternate stylesheet" disabled href="data:text/css,html { background: green }">
|
<link title="alt" rel="alternate stylesheet" disabled href="data:text/css,html { background: green }">
|
|
@ -2,8 +2,7 @@
|
||||||
<title><link disabled>'s "explicitly enabled" state doesn't persist for clones</title>
|
<title><link disabled>'s "explicitly enabled" state doesn't persist for clones</title>
|
||||||
<link rel="author" title="Emilio Cobos Álvarez" href="mailto:emilio@crisal.io">
|
<link rel="author" title="Emilio Cobos Álvarez" href="mailto:emilio@crisal.io">
|
||||||
<link rel="author" title="Mozilla" href="https://mozilla.org">
|
<link rel="author" title="Mozilla" href="https://mozilla.org">
|
||||||
<link rel="help" href="https://bugzilla.mozilla.org/show_bug.cgi?id=1281135">
|
<link rel="help" href="https://html.spec.whatwg.org/#attr-link-disabled">
|
||||||
<link rel="help" href="https://github.com/whatwg/html/issues/3840">
|
|
||||||
<script src="/resources/testharness.js"></script>
|
<script src="/resources/testharness.js"></script>
|
||||||
<script src="/resources/testharnessreport.js"></script>
|
<script src="/resources/testharnessreport.js"></script>
|
||||||
<link title="alt" rel="alternate stylesheet" disabled href="data:text/css,html { background: green }">
|
<link title="alt" rel="alternate stylesheet" disabled href="data:text/css,html { background: green }">
|
|
@ -2,8 +2,7 @@
|
||||||
<title><link disabled>'s "explicitly enabled" persists across rel changes</title>
|
<title><link disabled>'s "explicitly enabled" persists across rel changes</title>
|
||||||
<link rel="author" title="Emilio Cobos Álvarez" href="mailto:emilio@crisal.io">
|
<link rel="author" title="Emilio Cobos Álvarez" href="mailto:emilio@crisal.io">
|
||||||
<link rel="author" title="Mozilla" href="https://mozilla.org">
|
<link rel="author" title="Mozilla" href="https://mozilla.org">
|
||||||
<link rel="help" href="https://bugzilla.mozilla.org/show_bug.cgi?id=1281135">
|
<link rel="help" href="https://html.spec.whatwg.org/#attr-link-disabled">
|
||||||
<link rel="help" href="https://github.com/whatwg/html/issues/3840">
|
|
||||||
<script src="/resources/testharness.js"></script>
|
<script src="/resources/testharness.js"></script>
|
||||||
<script src="/resources/testharnessreport.js"></script>
|
<script src="/resources/testharnessreport.js"></script>
|
||||||
<link title="alt" rel="yadayada" disabled href="data:text/css,html { background: green }">
|
<link title="alt" rel="yadayada" disabled href="data:text/css,html { background: green }">
|
|
@ -2,8 +2,7 @@
|
||||||
<title><link disabled>'s "explicitly enabled" state isn't magically set from the setter</title>
|
<title><link disabled>'s "explicitly enabled" state isn't magically set from the setter</title>
|
||||||
<link rel="author" title="Emilio Cobos Álvarez" href="mailto:emilio@crisal.io">
|
<link rel="author" title="Emilio Cobos Álvarez" href="mailto:emilio@crisal.io">
|
||||||
<link rel="author" title="Mozilla" href="https://mozilla.org">
|
<link rel="author" title="Mozilla" href="https://mozilla.org">
|
||||||
<link rel="help" href="https://bugzilla.mozilla.org/show_bug.cgi?id=1281135">
|
<link rel="help" href="https://html.spec.whatwg.org/#attr-link-disabled">
|
||||||
<link rel="help" href="https://github.com/whatwg/html/issues/3840">
|
|
||||||
<script src="/resources/testharness.js"></script>
|
<script src="/resources/testharness.js"></script>
|
||||||
<script src="/resources/testharnessreport.js"></script>
|
<script src="/resources/testharnessreport.js"></script>
|
||||||
<script>
|
<script>
|
|
@ -2,8 +2,7 @@
|
||||||
<title><link disabled>'s "explicitly enabled" state works when set explicitly back and forth</title>
|
<title><link disabled>'s "explicitly enabled" state works when set explicitly back and forth</title>
|
||||||
<link rel="author" title="Emilio Cobos Álvarez" href="mailto:emilio@crisal.io">
|
<link rel="author" title="Emilio Cobos Álvarez" href="mailto:emilio@crisal.io">
|
||||||
<link rel="author" title="Mozilla" href="https://mozilla.org">
|
<link rel="author" title="Mozilla" href="https://mozilla.org">
|
||||||
<link rel="help" href="https://bugzilla.mozilla.org/show_bug.cgi?id=1281135">
|
<link rel="help" href="https://html.spec.whatwg.org/#attr-link-disabled">
|
||||||
<link rel="help" href="https://github.com/whatwg/html/issues/3840">
|
|
||||||
<script src="/resources/testharness.js"></script>
|
<script src="/resources/testharness.js"></script>
|
||||||
<script src="/resources/testharnessreport.js"></script>
|
<script src="/resources/testharnessreport.js"></script>
|
||||||
<script>
|
<script>
|
|
@ -3,8 +3,7 @@
|
||||||
<title>CSS Test: alternate stylesheets can be disabled by HTMLLinkElement.disabled if they have the disabled attribute already</title>
|
<title>CSS Test: alternate stylesheets can be disabled by HTMLLinkElement.disabled if they have the disabled attribute already</title>
|
||||||
<link rel="author" title="Emilio Cobos Álvarez" href="mailto:emilio@crisal.io">
|
<link rel="author" title="Emilio Cobos Álvarez" href="mailto:emilio@crisal.io">
|
||||||
<link rel="author" title="Mozilla" href="https://mozilla.org">
|
<link rel="author" title="Mozilla" href="https://mozilla.org">
|
||||||
<link rel="help" href="https://bugzilla.mozilla.org/show_bug.cgi?id=1281135">
|
<link rel="help" href="https://html.spec.whatwg.org/#attr-link-disabled">
|
||||||
<link rel="help" href="https://github.com/whatwg/html/issues/3840">
|
|
||||||
<link rel="match" href="HTMLLinkElement-disabled-alternate-ref.html">
|
<link rel="match" href="HTMLLinkElement-disabled-alternate-ref.html">
|
||||||
<link title="alt" rel="alternate stylesheet" href="data:text/css,html { background: green }" disabled onload="document.documentElement.className = ''">
|
<link title="alt" rel="alternate stylesheet" href="data:text/css,html { background: green }" disabled onload="document.documentElement.className = ''">
|
||||||
<script>
|
<script>
|
|
@ -0,0 +1,2 @@
|
||||||
|
<!DOCTYPE html>
|
||||||
|
<div style="position: relative; left: 100px; background: green; width: 100px; height: 100px"></div>
|
|
@ -0,0 +1,12 @@
|
||||||
|
<!DOCTYPE html>
|
||||||
|
<title>backdrop-filter with opacity:0 under border radius overflow clip should have no effect</title>
|
||||||
|
<link rel="help" href="https://drafts.fxtf.org/filter-effects-2/#BackdropFilterProperty">
|
||||||
|
<link rel="match" href="backdrop-filter-opacity-rounded-clip-ref.html">
|
||||||
|
<div style="width: 300px; height: 200px; border-radius: 80px; overflow: hidden; position: relative">
|
||||||
|
<!-- This should be fully clipped by the outer rounded clip. -->
|
||||||
|
<div style="width: 10px; height: 10px; background: cyan"></div>
|
||||||
|
<!-- This should be fully visible and not affected by the backdrop filter. -->
|
||||||
|
<div style="position: absolute; top: 0; left: 100px; width: 100px; height: 100px; background: green"></div>
|
||||||
|
<div style="position: absolute; top: 0; left: 100px; width: 100px; height: 1000px; opacity: 0; backdrop-filter: blur(3px)"></div>
|
||||||
|
</div>
|
||||||
|
|
|
@ -94,14 +94,14 @@
|
||||||
|
|
||||||
const observer = new MutationObserver(mutations => {
|
const observer = new MutationObserver(mutations => {
|
||||||
t.step(() => {
|
t.step(() => {
|
||||||
assert_equals(phase, 1);
|
assert_equals(phase, 1, "phase");
|
||||||
assert_equals(mutations.length, 1);
|
assert_equals(mutations.length, 1, "mutations.length");
|
||||||
const mutation = mutations[0];
|
const mutation = mutations[0];
|
||||||
assert_equals(mutation.type, "childList");
|
assert_equals(mutation.type, "childList", "mutation.type");
|
||||||
assert_equals(mutation.addedNodes.length, 2);
|
assert_equals(mutation.addedNodes.length, 2, "added nodes length");
|
||||||
assert_array_equals([...mutation.addedNodes], insertions);
|
assert_array_equals([...mutation.addedNodes], insertions, "added nodes");
|
||||||
assert_equals(mutation.removedNodes.length, 2);
|
assert_equals(mutation.removedNodes.length, 2, "removed nodes length");
|
||||||
assert_array_equals([...mutation.removedNodes], children);
|
assert_array_equals([...mutation.removedNodes], children, "removed nodes");
|
||||||
});
|
});
|
||||||
t.done();
|
t.done();
|
||||||
});
|
});
|
||||||
|
|
|
@ -0,0 +1,10 @@
|
||||||
|
<!DOCTYPE html>
|
||||||
|
<meta charset="utf-8">
|
||||||
|
<title>A test page that postMessage a SharedArrayBuffer to the parent and also sets document.domain</title>
|
||||||
|
|
||||||
|
<script>
|
||||||
|
"use strict";
|
||||||
|
|
||||||
|
document.domain = "{{host}}";
|
||||||
|
parent.postMessage(new SharedArrayBuffer(10), "*");
|
||||||
|
</script>
|
|
@ -0,0 +1,7 @@
|
||||||
|
<!DOCTYPE html>
|
||||||
|
<script>
|
||||||
|
const channel = new MessageChannel();
|
||||||
|
window.parent.postMessage(channel.port2, '*', [channel.port2]);
|
||||||
|
channel.port1.onmessage = e => { channel.port1.postMessage("message event received") };
|
||||||
|
channel.port1.onmessageerror = () => channel.port1.postMessage("messageerror event received");
|
||||||
|
</script>
|
|
@ -1,2 +1,2 @@
|
||||||
Cross-Origin-Opener-Policy: same-origin
|
|
||||||
Cross-Origin-Embedder-Policy: require-corp
|
Cross-Origin-Embedder-Policy: require-corp
|
||||||
|
Cross-Origin-Resource-Policy: same-site
|
|
@ -1,11 +0,0 @@
|
||||||
<!DOCTYPE html>
|
|
||||||
<meta charset="utf-8">
|
|
||||||
<title>A test page that messes with a given SharedArrayBuffer and also sets document.domain</title>
|
|
||||||
<script src="test-incrementer.js"></script>
|
|
||||||
|
|
||||||
<script>
|
|
||||||
"use strict";
|
|
||||||
|
|
||||||
document.domain = "{{host}}";
|
|
||||||
setupDestinationIncrementer(self, parent, "*");
|
|
||||||
</script>
|
|
|
@ -0,0 +1,23 @@
|
||||||
|
<!DOCTYPE html>
|
||||||
|
<meta charset="utf-8">
|
||||||
|
<title>Structured cloning of SharedArrayBuffers into same-origin-domain windows</title>
|
||||||
|
<link rel="help" href="https://html.spec.whatwg.org/multipage/#structuredserialize">
|
||||||
|
<link rel="author" title="Domenic Denicola" href="mailto:d@domenic.me">
|
||||||
|
<script src="/resources/testharness.js"></script>
|
||||||
|
<script src="/resources/testharnessreport.js"></script>
|
||||||
|
|
||||||
|
<div id="log"></div>
|
||||||
|
|
||||||
|
<script>
|
||||||
|
"use strict";
|
||||||
|
document.domain = "{{host}}";
|
||||||
|
|
||||||
|
async_test(t => {
|
||||||
|
const iframe = document.createElement("iframe");
|
||||||
|
t.add_cleanup(() => iframe.remove());
|
||||||
|
iframe.src = "//{{domains[www1]}}:{{location[port]}}/html/infrastructure/safe-passing-of-structured-data/shared-array-buffers/resources/iframe-domain-failure.sub.html";
|
||||||
|
window.onmessage = t.unreached_func("Got a message event, expected a messageerror event");
|
||||||
|
window.onmessageerror = t.step_func_done();
|
||||||
|
document.body.append(iframe);
|
||||||
|
}, "SharedArrayBuffer and a same-origin-domain (but not same-origin) iframe");
|
||||||
|
</script>
|
Some files were not shown because too many files have changed in this diff Show more
Loading…
Add table
Add a link
Reference in a new issue