Auto merge of #25976 - servo-wpt-sync:wpt_update_17-03-2020, r=servo-wpt-sync

Sync WPT with upstream (17-03-2020)

Automated downstream sync of changes from upstream as of 17-03-2020.
[no-wpt-sync]
r? @servo-wpt-sync
This commit is contained in:
bors-servo 2020-03-17 09:59:44 -04:00 committed by GitHub
commit 54769a86b9
No known key found for this signature in database
GPG key ID: 4AEE18F83AFDEB23
145 changed files with 2974 additions and 433 deletions

View file

@ -123081,6 +123081,32 @@
{}
]
],
"all-prop-inherit-color.html": [
"bd2503d56df3e9b81edc2ffdf2aba83da32d3932",
[
null,
[
[
"/css/css-cascade/reference/ref-green-text.html",
"=="
]
],
{}
]
],
"all-prop-initial-color.html": [
"beccbf64abe1eb7e4f7ce748720ee7a31155e3ba",
[
null,
[
[
"/css/css-cascade/reference/ref-green-text.html",
"=="
]
],
{}
]
],
"all-prop-initial-visited.html": [
"6fb7936652a77dade7d5e72032064b67d2886637",
[
@ -123094,6 +123120,32 @@
{}
]
],
"all-prop-revert-color.html": [
"3ac55cb18a108cd24ffcc470990dcb91516889b9",
[
null,
[
[
"/css/css-cascade/reference/ref-green-text.html",
"=="
]
],
{}
]
],
"all-prop-unset-color.html": [
"6bd59a6fc81c52061ed9106f29f25a2fbc48215f",
[
null,
[
[
"/css/css-cascade/reference/ref-green-text.html",
"=="
]
],
{}
]
],
"important-prop.html": [
"5a3dad10897d27cf6d476705cd5ae76dc4be5c1f",
[
@ -123565,7 +123617,7 @@
]
],
"lab-001.html": [
"70dbd9123c5405c3ec020b01ed01e15c44af10c6",
"f507f86c79c45181d16714893db5f6c97c079086",
[
null,
[
@ -123578,7 +123630,7 @@
]
],
"lab-002.html": [
"1f1b44768147886528d50c8868eb2675e808b843",
"bcf04e36835b491b494af36b2ae6bf9d593d29f1",
[
null,
[
@ -123591,7 +123643,7 @@
]
],
"lab-003.html": [
"072dafa211b45a4de0eeaf15e8d8debd6dca4db7",
"ddf2d1780ec639e495e66feb6e576a9ba20ccedc",
[
null,
[
@ -123604,7 +123656,7 @@
]
],
"lab-004.html": [
"2cd327f2699cd77f2fc954eb94ce9bd8e41435b5",
"056835ac477cdb8dda3637125a14561949dcca73",
[
null,
[
@ -123617,7 +123669,7 @@
]
],
"lab-005.html": [
"846430f8360bf7452891d2b8efd4d3f81a5d2cf7",
"8149771fb64049e7b27d9c67b7f6e79853eff12f",
[
null,
[
@ -123630,7 +123682,7 @@
]
],
"lab-006.html": [
"926c1f08236ae97054ea7055c9624858b9166ee5",
"0f175ab5ec73d95c2ca2470516c888dd2238554f",
[
null,
[
@ -123643,7 +123695,7 @@
]
],
"lab-007.html": [
"917bc1a399fd839daf4771e0e1c74235d2f1308d",
"a99cebd2572c02288cb25b1440ee5f71413aa803",
[
null,
[
@ -123656,7 +123708,7 @@
]
],
"lch-001.html": [
"3b0b5af0a55ea70a61afee62c2ddcde6c912fc28",
"6bc0c5f7da6054d2f1a4d6662410210e8a6dea7f",
[
null,
[
@ -123669,7 +123721,7 @@
]
],
"lch-002.html": [
"d87d0421a0d061c49cc833b044d95cd0232f6cb2",
"52a546290719dae3bc4af371f0e6ea100a1dc9a0",
[
null,
[
@ -123682,7 +123734,7 @@
]
],
"lch-003.html": [
"eb8f8a25b4a61aaae22230441199d73a3c0df37f",
"7539e9d583f15e3a39abf3dcd773d3ceb8fe1ce0",
[
null,
[
@ -123695,7 +123747,7 @@
]
],
"lch-004.html": [
"0db243c91833a527b6736eeb1a112e6fafefadf1",
"67d71a8ba3673fb004c059e666f9c8dadecfe992",
[
null,
[
@ -123708,7 +123760,7 @@
]
],
"lch-005.html": [
"c16d02b335c15791c69872573acd185644fb0e74",
"571f7aaab7b20387b433b699fbe6bd288c6bee10",
[
null,
[
@ -123721,7 +123773,7 @@
]
],
"lch-006.html": [
"c3bbd14f5078406449dbf6ec1cd6b5999ef26e2c",
"ea490937c57d7590cef519e1b7f9084e038a9861",
[
null,
[
@ -123734,7 +123786,7 @@
]
],
"lch-007.html": [
"4646bc9a32433389b7014ce766345354fcbb7c8d",
"6d9a9740414494139ac8dd537a8d2d32ce61d06e",
[
null,
[
@ -190882,6 +190934,19 @@
{}
]
],
"abs-pos-with-replaced-child.html": [
"c68de4fb57b32f810ab1668d98d27e0209428a0e",
[
null,
[
[
"/css/reference/ref-filled-green-100px-square-only.html",
"=="
]
],
{}
]
],
"astral-bidi": {
"adlam-anti-ref.html": [
"db4c2fdfea2f4b10f413d3279f996e69dbb6a072",
@ -240812,7 +240877,7 @@
[]
],
"generate.py": [
"ad2913cff8c2f847c3ce20a4fcb43d8429cd688a",
"f740f45b8b99d7fa2cd518e053733b1401035182",
[]
],
"spec.src.json": [
@ -281644,6 +281709,10 @@
"ref-filled-green-100px-square.xht": [
"05a13794482a94f6c10bd9d4c98704e63ef60331",
[]
],
"ref-green-text.html": [
"8183c04087037c66bb33def60bae0ea79ec964df",
[]
]
}
},
@ -309977,7 +310046,7 @@
[]
],
"from-local-system.md": [
"70e70e79cc64e5ff68d1c007bdb62b9db7b7ae9c",
"8c71e535baa907f1ef86641ee6211adb7d0c2423",
[]
],
"from-web.md": [
@ -316178,6 +316247,10 @@
"46ad58d83bf6e98913ca4c564b7acb8f19fa0093",
[]
],
"popup-coop-by-sw-from-coop.https.html.headers": [
"63b60e490f47f4db77d33d7a4ca2f5b9a4181de8",
[]
],
"popup-redirect-cache.https.html.headers": [
"46ad58d83bf6e98913ca4c564b7acb8f19fa0093",
[]
@ -316231,6 +316304,10 @@
"748fd996cfbb5dceec670033308fa68502d70cb0",
[]
],
"popup-coop-by-sw.js": [
"7b16e3162713de8132886178c5c8be106e7ec712",
[]
],
"postback.html": [
"5955e2d7593a51fa112fe82bb97b79add54f3ba0",
[]
@ -316238,6 +316315,10 @@
"postback.html.headers": [
"4e798cd9f5d3f756df077a43ce9a1a6f9b41fd28",
[]
],
"universal-worker.js": [
"244167937219cfd784f13d8ed37eedead64665e9",
[]
]
}
},
@ -327332,6 +327413,92 @@
}
}
},
"sharedworker-classic.http-rp": {
"unset": {
"fetch": {
"cross-http.keep-scheme.https.html.headers": [
"46e2255e388e9e08377d625b55653a007d59c14e",
[]
],
"cross-http.no-redirect.https.html.headers": [
"46e2255e388e9e08377d625b55653a007d59c14e",
[]
],
"cross-http.swap-scheme.https.html.headers": [
"46e2255e388e9e08377d625b55653a007d59c14e",
[]
],
"same-http.keep-scheme.https.html.headers": [
"46e2255e388e9e08377d625b55653a007d59c14e",
[]
],
"same-http.no-redirect.https.html.headers": [
"46e2255e388e9e08377d625b55653a007d59c14e",
[]
],
"same-http.swap-scheme.https.html.headers": [
"46e2255e388e9e08377d625b55653a007d59c14e",
[]
],
"same-https.keep-scheme.https.html.headers": [
"46e2255e388e9e08377d625b55653a007d59c14e",
[]
],
"same-https.no-redirect.https.html.headers": [
"46e2255e388e9e08377d625b55653a007d59c14e",
[]
]
},
"websocket": {
"cross-ws.no-redirect.https.html.headers": [
"46e2255e388e9e08377d625b55653a007d59c14e",
[]
],
"same-ws.no-redirect.https.html.headers": [
"46e2255e388e9e08377d625b55653a007d59c14e",
[]
],
"same-wss.no-redirect.https.html.headers": [
"46e2255e388e9e08377d625b55653a007d59c14e",
[]
]
},
"xhr": {
"cross-http.keep-scheme.https.html.headers": [
"46e2255e388e9e08377d625b55653a007d59c14e",
[]
],
"cross-http.no-redirect.https.html.headers": [
"46e2255e388e9e08377d625b55653a007d59c14e",
[]
],
"cross-http.swap-scheme.https.html.headers": [
"46e2255e388e9e08377d625b55653a007d59c14e",
[]
],
"same-http.keep-scheme.https.html.headers": [
"46e2255e388e9e08377d625b55653a007d59c14e",
[]
],
"same-http.no-redirect.https.html.headers": [
"46e2255e388e9e08377d625b55653a007d59c14e",
[]
],
"same-http.swap-scheme.https.html.headers": [
"46e2255e388e9e08377d625b55653a007d59c14e",
[]
],
"same-https.keep-scheme.https.html.headers": [
"46e2255e388e9e08377d625b55653a007d59c14e",
[]
],
"same-https.no-redirect.https.html.headers": [
"46e2255e388e9e08377d625b55653a007d59c14e",
[]
]
}
}
},
"sharedworker-module-data.http-rp": {
"opt-in": {
"fetch": {
@ -327434,6 +327601,92 @@
}
}
},
"sharedworker-module.http-rp": {
"unset": {
"fetch": {
"cross-http.keep-scheme.https.html.headers": [
"46e2255e388e9e08377d625b55653a007d59c14e",
[]
],
"cross-http.no-redirect.https.html.headers": [
"46e2255e388e9e08377d625b55653a007d59c14e",
[]
],
"cross-http.swap-scheme.https.html.headers": [
"46e2255e388e9e08377d625b55653a007d59c14e",
[]
],
"same-http.keep-scheme.https.html.headers": [
"46e2255e388e9e08377d625b55653a007d59c14e",
[]
],
"same-http.no-redirect.https.html.headers": [
"46e2255e388e9e08377d625b55653a007d59c14e",
[]
],
"same-http.swap-scheme.https.html.headers": [
"46e2255e388e9e08377d625b55653a007d59c14e",
[]
],
"same-https.keep-scheme.https.html.headers": [
"46e2255e388e9e08377d625b55653a007d59c14e",
[]
],
"same-https.no-redirect.https.html.headers": [
"46e2255e388e9e08377d625b55653a007d59c14e",
[]
]
},
"websocket": {
"cross-ws.no-redirect.https.html.headers": [
"46e2255e388e9e08377d625b55653a007d59c14e",
[]
],
"same-ws.no-redirect.https.html.headers": [
"46e2255e388e9e08377d625b55653a007d59c14e",
[]
],
"same-wss.no-redirect.https.html.headers": [
"46e2255e388e9e08377d625b55653a007d59c14e",
[]
]
},
"xhr": {
"cross-http.keep-scheme.https.html.headers": [
"46e2255e388e9e08377d625b55653a007d59c14e",
[]
],
"cross-http.no-redirect.https.html.headers": [
"46e2255e388e9e08377d625b55653a007d59c14e",
[]
],
"cross-http.swap-scheme.https.html.headers": [
"46e2255e388e9e08377d625b55653a007d59c14e",
[]
],
"same-http.keep-scheme.https.html.headers": [
"46e2255e388e9e08377d625b55653a007d59c14e",
[]
],
"same-http.no-redirect.https.html.headers": [
"46e2255e388e9e08377d625b55653a007d59c14e",
[]
],
"same-http.swap-scheme.https.html.headers": [
"46e2255e388e9e08377d625b55653a007d59c14e",
[]
],
"same-https.keep-scheme.https.html.headers": [
"46e2255e388e9e08377d625b55653a007d59c14e",
[]
],
"same-https.no-redirect.https.html.headers": [
"46e2255e388e9e08377d625b55653a007d59c14e",
[]
]
}
}
},
"top.http-rp": {
"opt-in": {
"audio-tag": {
@ -328898,7 +329151,7 @@
]
},
"spec.src.json": [
"c3aa5eb0fdaca7f45fdad1247aa8957a22b6e544",
"1e7d7c9dbe008e45a834814d3e30a0ac1e636ba7",
[]
]
},
@ -331173,7 +331426,7 @@
]
},
"spec.src.json": [
"8dd6526eae0da60c5318ad9ce3df132bbe0e21dd",
"2b1652114883cde7aca48e788f9af52048028ea6",
[]
]
},
@ -332053,7 +332306,7 @@
]
},
"spec.src.json": [
"8dd6526eae0da60c5318ad9ce3df132bbe0e21dd",
"2b1652114883cde7aca48e788f9af52048028ea6",
[]
]
},
@ -332933,7 +333186,7 @@
]
},
"spec.src.json": [
"8dd6526eae0da60c5318ad9ce3df132bbe0e21dd",
"2b1652114883cde7aca48e788f9af52048028ea6",
[]
]
},
@ -337867,7 +338120,7 @@
[]
],
"test-case.sub.js": [
"a8292e57e1fe32efbed35a184fd7461198643dd1",
"a115837c86b32fd08327d021b5ce39d8a5bed3d1",
[]
]
},
@ -338505,7 +338758,7 @@
[]
],
"api-tests-1.html": [
"7c77afdda8e37ee429ed272e24461af6cd68429a",
"237b4ea876e589cb6e231872dc816d7171e47c3e",
[]
],
"api-tests-2.html": [
@ -353137,11 +353390,11 @@
[]
],
"embedded_style_media_queries-ref.html": [
"f99172ef2c10cdc2276c935542c97b36048a02c4",
"d132b132b44b2349c0f1017c484a1f85d9ea8f44",
[]
],
"embedded_style_media_queries_resized-ref.html": [
"5f1e0b96807962e3a7b6eb06c8e128f30c756c37",
"46c8ad4741215faa108e3ae3a98e1bd7ff356397",
[]
],
"embedded_style_multiple_tracks-ref.html": [
@ -355066,7 +355319,7 @@
[]
],
"new-shared-worker-window.html": [
"a7fee4d85595f0c6414364164ced1883c6278247",
"84564fd7b6e5d2bc43c844e97682c425abaf9ed7",
[]
],
"new-worker-window.html": [
@ -355643,7 +355896,7 @@
[]
],
"referrer-tests.js": [
"10cfcf4b8b4c2b01d63b0bf9d5affc7945bfe0d7",
"ab24945f31dae92039803cac7ddb85e7431ae155",
[]
],
"referrer-window.html": [
@ -400426,7 +400679,7 @@
]
],
"event-dispatch.tentative.html": [
"cd5b6ab30b17f21098a225d61c251e657732bb44",
"9e4946cf336ad0d78b3b87426d121a39ffb98037",
[
null,
{}
@ -432674,6 +432927,20 @@
}
]
],
"popup-coop-by-sw-from-coop.https.html": [
"fc38ea1c66b3ec5ccd8f517a2e76a0c203846c8e",
[
null,
{}
]
],
"popup-coop-by-sw.https.html": [
"13d9e79ca77c65e9dbd719e4601f6a8af476ae7f",
[
null,
{}
]
],
"popup-meta-http-equiv.https.html": [
"e36b5190aafc0b42b043802422dd411a831a20a5",
[
@ -453897,6 +454164,147 @@
]
]
}
},
"unset": {
"fetch": {
"cross-http.keep-scheme.https.html": [
"ef3d507cb0ff5414d396e5ecf797c887bdbd3c97",
[
null,
{}
]
],
"cross-http.no-redirect.https.html": [
"0cc639284a37d118fa1a6d253f84136344aa8505",
[
null,
{}
]
],
"cross-http.swap-scheme.https.html": [
"2d80d2741ee9b01a42835778d93ec8bdf1500163",
[
null,
{}
]
],
"same-http.keep-scheme.https.html": [
"d6be006f53ff3a69ec44421de4e33c9b7a38e43a",
[
null,
{}
]
],
"same-http.no-redirect.https.html": [
"6062f7d97154e7479ceabaaaffcdfbe29c6ed49d",
[
null,
{}
]
],
"same-http.swap-scheme.https.html": [
"0e54fd718d190f686a11b75f19494f8719c7a6fd",
[
null,
{}
]
],
"same-https.keep-scheme.https.html": [
"2272b7ded7a95c66d2784eaefb8546f5757399c0",
[
null,
{}
]
],
"same-https.no-redirect.https.html": [
"1149df0ed6dd7ba475be2d81e1b0317bf38715bd",
[
null,
{}
]
]
},
"websocket": {
"cross-ws.no-redirect.https.html": [
"e8f99265139accb689dd1747b6904454d63c105b",
[
null,
{}
]
],
"same-ws.no-redirect.https.html": [
"eb9c582eb52e3289c727650c650c6e67e072b49c",
[
null,
{}
]
],
"same-wss.no-redirect.https.html": [
"9b088f33b3fd6dd8b7b32b08f49665705478bcde",
[
null,
{}
]
]
},
"xhr": {
"cross-http.keep-scheme.https.html": [
"dea784bfa5680270e3c61675c3723114495aa631",
[
null,
{}
]
],
"cross-http.no-redirect.https.html": [
"8929b78df5e79bb64c2810eced435ef3225d34c5",
[
null,
{}
]
],
"cross-http.swap-scheme.https.html": [
"093900c96a6910c8c8cfa82fcf74c7624be0d13b",
[
null,
{}
]
],
"same-http.keep-scheme.https.html": [
"f1496d392a3fb0e0f1f67b5a10f6e69999c20d30",
[
null,
{}
]
],
"same-http.no-redirect.https.html": [
"667020a75ca73069fc119a5228192588d706e8b1",
[
null,
{}
]
],
"same-http.swap-scheme.https.html": [
"92535f8243eb8f74c27d6b8e537b6fce63603f1d",
[
null,
{}
]
],
"same-https.keep-scheme.https.html": [
"341fa52c0e2c76b6118b0b684f9cf8eebc5c8b7f",
[
null,
{}
]
],
"same-https.no-redirect.https.html": [
"4c20e11de6a8f5cd6327abc2c82c4fc50f096e8b",
[
null,
{}
]
]
}
}
},
"sharedworker-module-data.http-rp": {
@ -454453,6 +454861,147 @@
]
]
}
},
"unset": {
"fetch": {
"cross-http.keep-scheme.https.html": [
"213992846c881d8894de712af30a66e6e08feb35",
[
null,
{}
]
],
"cross-http.no-redirect.https.html": [
"22502bfbfb64d51d3792f6658d56c383d54cc1da",
[
null,
{}
]
],
"cross-http.swap-scheme.https.html": [
"0f08bb331a0d2efe3717a4982176e3ac89d69f5b",
[
null,
{}
]
],
"same-http.keep-scheme.https.html": [
"bb07807b4d061a3a5fb09ccf34f4ec7c7acd24d4",
[
null,
{}
]
],
"same-http.no-redirect.https.html": [
"ae92b955cfaa57ddb5e4e36fd68a1bbacd5ac20f",
[
null,
{}
]
],
"same-http.swap-scheme.https.html": [
"20b2f23c3d0db3d4ba7f9f9ac25cfe28e3a9472a",
[
null,
{}
]
],
"same-https.keep-scheme.https.html": [
"eadfb9b5dd002ca56e92b8ed4af57f2a8f42bc8f",
[
null,
{}
]
],
"same-https.no-redirect.https.html": [
"e9aa942825ef7428ec8667d30c199b3913e0afd6",
[
null,
{}
]
]
},
"websocket": {
"cross-ws.no-redirect.https.html": [
"2d7f4d1b6b4fa0c63f383f4e9a66933d5a2fa491",
[
null,
{}
]
],
"same-ws.no-redirect.https.html": [
"7829f4e6f8b8837768a36f89d0823eadb5cd44a1",
[
null,
{}
]
],
"same-wss.no-redirect.https.html": [
"946e02023a201aec258cc4b2e94b52f19184a037",
[
null,
{}
]
]
},
"xhr": {
"cross-http.keep-scheme.https.html": [
"06f3eab1728c11331f5e6c27ca0e147d6a03c55f",
[
null,
{}
]
],
"cross-http.no-redirect.https.html": [
"46390891fecd07e2974ea304252d0441ad8f57b0",
[
null,
{}
]
],
"cross-http.swap-scheme.https.html": [
"b7100e1ac7921f59d4d4bcf76f35accec0d3ad52",
[
null,
{}
]
],
"same-http.keep-scheme.https.html": [
"08b9bcfa813c9b9b89954de985f8e3867ba1732e",
[
null,
{}
]
],
"same-http.no-redirect.https.html": [
"5c070566dde62ba096199825c07b17268656f1da",
[
null,
{}
]
],
"same-http.swap-scheme.https.html": [
"bf7450d6de69dcaf091f9a532f55f310ab5f9f9d",
[
null,
{}
]
],
"same-https.keep-scheme.https.html": [
"ef31d39e4e73cd0f9ac020a32e3acf8b92176ea8",
[
null,
{}
]
],
"same-https.no-redirect.https.html": [
"6be0758ea861caa6fb942f16bc15de83625af353",
[
null,
{}
]
]
}
}
},
"top.http-rp": {
@ -527286,7 +527835,7 @@
]
],
"constructor.html": [
"336afd504e56c30337ec18a8a014eef3a1cd45f5",
"5d13035f6a1f527c2467f5768908e6b27eda6995",
[
null,
{}
@ -527307,14 +527856,14 @@
]
],
"current-time-writing-modes.html": [
"b409f097bcb6d120d32227baab9f0f276b927c0c",
"243f152ec7128015e8400c4240fdebc0b1971fdf",
[
null,
{}
]
],
"current-time.html": [
"9db7ec6a6b5c63758b3fb8d291146e1ea42f4db4",
"cb710aa089010e3e1f57a4cc39ed59eccb207b0c",
[
null,
{}
@ -530389,7 +530938,7 @@
]
],
"slots-imperative-slot-api.tentative.html": [
"5999ec82a384a4dcf67451e8e83f3e59e5138c0b",
"56dd71b1156cc3ac146a794e28e3b4b2bd58d143",
[
null,
{}
@ -552891,6 +553440,13 @@
]
},
"the-audiocontext-interface": {
"audiocontext-detached-execution-context.tentative.html": [
"22a98e291ae4b51ec93046d4058a68aa3aff4a12",
[
null,
{}
]
],
"audiocontext-getoutputtimestamp.html": [
"952f38b1edceb62ab3f99c25777ebdb2c59e691a",
[
@ -553869,6 +554425,13 @@
null,
{}
]
],
"offlineaudiocontext-detached-execution-context.tentative.html": [
"ba44829f122d9ad0064b4b793578326c8190ce50",
[
null,
{}
]
]
},
"the-oscillatornode-interface": {
@ -556044,6 +556607,13 @@
}
]
],
"RTCRtpSender.https.html": [
"d17115c46af24eba05a812c683d3fc8d2b07d7c6",
[
null,
{}
]
],
"RTCRtpTransceiver-direction.html": [
"e76bc1fbb7740f7a575f0acba397284aa5d5db94",
[
@ -564406,7 +564976,7 @@
]
],
"shared-worker-import-csp.html": [
"0197b300e9e345089769b202dbd4bbcc060a0760",
"b6d8642886dc1daa1e06ec4f293ceb54a001a3de",
[
null,
{}
@ -564452,10 +565022,12 @@
]
],
"shared-worker-import-referrer.html": [
"abd4b41f79e29b4fe66bd0d607084807dc151d7c",
"1096fd2ad872288fb3d7c87fbe1df67123a9f7ab",
[
null,
{}
{
"timeout": "long"
}
]
],
"shared-worker-import.any.js": [

View file

@ -1,4 +1,4 @@
[hit-test-floats-003.html]
[hit-test-floats-004.html]
[Miss float below something else]
expected: FAIL

View file

@ -2,3 +2,6 @@
[Hit test intersecting scaled box]
expected: FAIL
[Hit test within unscaled box]
expected: FAIL

View file

@ -1,2 +1,2 @@
[no-transition-from-ua-to-blocking-stylesheet.html]
expected: TIMEOUT
expected: FAIL

View file

@ -0,0 +1,4 @@
[CaretPosition-001.html]
[Element at (400, 100)]
expected: FAIL

View file

@ -0,0 +1,4 @@
[elementFromPoint-001.html]
[CSSOM View - 5 - extensions to the Document interface]
expected: FAIL

View file

@ -21,6 +21,3 @@
[test the top of layer]
expected: FAIL
[test some point of the element: top left corner]
expected: FAIL

View file

@ -2,3 +2,6 @@
[elementsFromPoint on the root document for points in iframe elements]
expected: FAIL
[elementsFromPoint on inner documents]
expected: FAIL

View file

@ -1,4 +0,0 @@
[elementsFromPoint-invalid-cases.html]
[The root element is the last element returned for otherwise empty queries within the viewport]
expected: FAIL

View file

@ -1,7 +0,0 @@
[offsetTopLeft-border-box.html]
[container: 1]
expected: FAIL
[container: 0]
expected: FAIL

View file

@ -312,12 +312,6 @@
[fetch(): separate response Content-Type: text/plain ]
expected: NOTRUN
[<iframe>: separate response Content-Type: text/html;" text/plain]
expected: FAIL
[<iframe>: separate response Content-Type: text/html */*;charset=gbk]
expected: FAIL
[<iframe>: separate response Content-Type: text/html;" \\" text/plain]
expected: FAIL
@ -330,3 +324,6 @@
[<iframe>: combined response Content-Type: text/html */*;charset=gbk]
expected: FAIL
[<iframe>: combined response Content-Type: text/html;" text/plain]
expected: FAIL

View file

@ -56,6 +56,3 @@
[separate text/javascript x/x]
expected: FAIL
[separate text/javascript;charset=windows-1252 error text/javascript]
expected: FAIL

View file

@ -11,3 +11,9 @@
[X-Content-Type-Options%3A%20nosniff%2C%2C%40%23%24%23%25%25%26%5E%26%5E*()()11!]
expected: FAIL
[X-Content-Type-Options%3A%20%40%23%24%23%25%25%26%5E%26%5E*()()11!%2Cnosniff]
expected: FAIL
[Content-Type-Options%3A%20nosniff]
expected: FAIL

View file

@ -1,4 +1,4 @@
[traverse_the_history_2.html]
[traverse_the_history_3.html]
[Multiple history traversals, last would be aborted]
expected: FAIL

View file

@ -0,0 +1,4 @@
[traverse_the_history_4.html]
[Multiple history traversals, last would be aborted]
expected: FAIL

View file

@ -1,20 +1,16 @@
[supported-elements.html]
expected: TIMEOUT
[Contenteditable element should support autofocus]
expected: FAIL
[Element with tabindex should support autofocus]
expected: TIMEOUT
expected: FAIL
[Host element with delegatesFocus including no focusable descendants should be skipped]
expected: NOTRUN
expected: FAIL
[Area element should support autofocus]
expected: NOTRUN
expected: FAIL
[Host element with delegatesFocus should support autofocus]
expected: NOTRUN
[Non-HTMLElement should not support autofocus]
expected: NOTRUN
expected: FAIL

View file

@ -65,3 +65,6 @@
[X Rendered audio for channel 5 does not equal [0,0.0626220703125,0.125030517578125,0.18695068359375,0.24810791015625,0.308319091796875,0.3673095703125,0.42486572265625,0.480743408203125,0.53472900390625,0.58660888671875,0.636199951171875,0.68328857421875,0.727691650390625,0.76922607421875,0.8077392578125...\] with an element-wise tolerance of {"absoluteThreshold":0.000030517578125,"relativeThreshold":0}.\n\tIndex\tActual\t\t\tExpected\t\tAbsError\t\tRelError\t\tTest threshold\n\t[1\]\t3.6732959747314453e-1\t6.2622070312500000e-2\t3.0470752716064453e-1\t4.8658168859649127e+0\t3.0517578125000000e-5\n\t[2\]\t6.8329977989196777e-1\t1.2503051757812500e-1\t5.5826926231384277e-1\t4.4650639949963384e+0\t3.0517578125000000e-5\n\t[3\]\t9.0373212099075317e-1\t1.8695068359375000e-1\t7.1678143739700317e-1\t3.8340669508039502e+0\t3.0517578125000000e-5\n\t[4\]\t9.9780619144439697e-1\t2.4810791015625000e-1\t7.4969828128814697e-1\t3.0216621502152523e+0\t3.0517578125000000e-5\n\t[5\]\t9.5236867666244507e-1\t3.0831909179687500e-1\t6.4404958486557007e-1\t2.0889059484187866e+0\t3.0517578125000000e-5\n\t...and 44050 more errors.\n\tMax AbsError of 1.9986611604690552e+0 at index of 37130.\n\t[37130\]\t-9.9994289875030518e-1\t9.9871826171875000e-1\t1.9986611604690552e+0\t2.0012262087101997e+0\t3.0517578125000000e-5\n\tMax RelError of Infinity at index of 14112.\n\t[14112\]\t-9.5105654001235962e-1\t0.0000000000000000e+0\t9.5105654001235962e-1\tInfinity\t3.0517578125000000e-5\n]
expected: FAIL
[X Rendered audio for channel 5 does not equal [0,0.0626220703125,0.125030517578125,0.18695068359375,0.24810791015625,0.308319091796875,0.3673095703125,0.42486572265625,0.480743408203125,0.53472900390625,0.58660888671875,0.636199951171875,0.68328857421875,0.727691650390625,0.76922607421875,0.8077392578125...\] with an element-wise tolerance of {"absoluteThreshold":0.000030517578125,"relativeThreshold":0}.\n\tIndex\tActual\t\t\tExpected\t\tAbsError\t\tRelError\t\tTest threshold\n\t[1\]\t3.6732959747314453e-1\t6.2622070312500000e-2\t3.0470752716064453e-1\t4.8658168859649127e+0\t3.0517578125000000e-5\n\t[2\]\t6.8329977989196777e-1\t1.2503051757812500e-1\t5.5826926231384277e-1\t4.4650639949963384e+0\t3.0517578125000000e-5\n\t[3\]\t9.0373212099075317e-1\t1.8695068359375000e-1\t7.1678143739700317e-1\t3.8340669508039502e+0\t3.0517578125000000e-5\n\t[4\]\t9.9780619144439697e-1\t2.4810791015625000e-1\t7.4969828128814697e-1\t3.0216621502152523e+0\t3.0517578125000000e-5\n\t[5\]\t9.5236867666244507e-1\t3.0831909179687500e-1\t6.4404958486557007e-1\t2.0889059484187866e+0\t3.0517578125000000e-5\n\t...and 42283 more errors.\n\tMax AbsError of 1.9985451102256775e+0 at index of 36228.\n\t[36228\]\t-9.9997943639755249e-1\t9.9856567382812500e-1\t1.9985451102256775e+0\t2.0014157932787811e+0\t3.0517578125000000e-5\n\tMax RelError of Infinity at index of 10584.\n\t[10584\]\t-5.8778524398803711e-1\t0.0000000000000000e+0\t5.8778524398803711e-1\tInfinity\t3.0517578125000000e-5\n]
expected: FAIL

View file

@ -227,3 +227,6 @@
[X Stitched sine-wave buffers at sample rate 44100 does not equal [0,0.06264832615852356,0.12505052983760834,0.18696144223213196,0.24813786149024963,0.308339387178421,0.36732959747314453,0.4248766601085663,0.480754554271698,0.5347436666488647,0.5866320133209229,0.6362156271934509,0.6832997798919678,0.7276994585990906,0.7692402601242065,0.8077589869499207...\] with an element-wise tolerance of {"absoluteThreshold":0.000090957,"relativeThreshold":0}.\n\tIndex\tActual\t\t\tExpected\t\tAbsError\t\tRelError\t\tTest threshold\n\t[31080\]\t-4.6403300714282137e-34\t5.6332010030746460e-1\t5.6332010030746460e-1\t1.0000000000000000e+0\t9.0957000000000003e-5\n\t[31081\]\t4.5750993561740953e-41\t6.1397600173950195e-1\t6.1397600173950195e-1\t1.0000000000000000e+0\t9.0957000000000003e-5\n\tMax AbsError of 6.1397600173950195e-1 at index of 31081.\n\tMax RelError of 1.0000000000000000e+0 at index of 31080.\n]
expected: FAIL
[X Stitched sine-wave buffers at sample rate 44100 does not equal [0,0.06264832615852356,0.12505052983760834,0.18696144223213196,0.24813786149024963,0.308339387178421,0.36732959747314453,0.4248766601085663,0.480754554271698,0.5347436666488647,0.5866320133209229,0.6362156271934509,0.6832997798919678,0.7276994585990906,0.7692402601242065,0.8077589869499207...\] with an element-wise tolerance of {"absoluteThreshold":0.000090957,"relativeThreshold":0}.\n\tIndex\tActual\t\t\tExpected\t\tAbsError\t\tRelError\t\tTest threshold\n\t[31080\]\t5.1024765332304224e-22\t5.6332010030746460e-1\t5.6332010030746460e-1\t1.0000000000000000e+0\t9.0957000000000003e-5\n\t[31081\]\t4.5801440306456646e-41\t6.1397600173950195e-1\t6.1397600173950195e-1\t1.0000000000000000e+0\t9.0957000000000003e-5\n\tMax AbsError of 6.1397600173950195e-1 at index of 31081.\n\tMax RelError of 1.0000000000000000e+0 at index of 31080.\n]
expected: FAIL

View file

@ -0,0 +1,8 @@
[audiocontext-detached-execution-context.tentative.html]
expected: TIMEOUT
[Executing "decoding-on-detached-iframe"]
expected: TIMEOUT
[Audit report]
expected: NOTRUN

View file

@ -0,0 +1,4 @@
[offlineaudiocontext-detached-execution-context.tentative.html]
[Executing "decoding-on-detached-iframe"]
expected: FAIL

View file

@ -0,0 +1,5 @@
[017.html]
expected: TIMEOUT
[origin of the script that invoked the method, about:blank]
expected: TIMEOUT

View file

@ -0,0 +1,5 @@
[018.html]
expected: TIMEOUT
[origin of the script that invoked the method, javascript:]
expected: TIMEOUT

View file

@ -254,15 +254,19 @@ def generate_test_source_files(spec_directory, test_helper_filenames,
artifact_order = test_expansion_schema.keys()
artifact_order.remove('expansion')
excluded_selection_pattern = ''
for key in artifact_order:
excluded_selection_pattern += '%(' + key + ')s/'
# Create list of excluded tests.
exclusion_dict = {}
exclusion_dict = set()
for excluded_pattern in spec_json['excluded_tests']:
excluded_expansion = \
expand_pattern(excluded_pattern, test_expansion_schema)
for excluded_selection in permute_expansion(excluded_expansion,
artifact_order):
excluded_selection['delivery_key'] = spec_json['delivery_key']
exclusion_dict[dump_test_parameters(excluded_selection)] = True
exclusion_dict.add(excluded_selection_pattern % excluded_selection)
for spec in specification:
# Used to make entries with expansion="override" override preceding
@ -287,7 +291,7 @@ def generate_test_source_files(spec_directory, test_helper_filenames,
for selection_path in output_dict:
selection = output_dict[selection_path]
if dump_test_parameters(selection) in exclusion_dict:
if (excluded_selection_pattern % selection) in exclusion_dict:
print('Excluding selection:', selection_path)
continue
try:

View file

@ -0,0 +1,24 @@
<!DOCTYPE html>
<html>
<head>
<meta charset="utf-8">
<title>CSS Cascade: "color" property preceded by "all: initial"</title>
<link rel="help" href="https://www.w3.org/TR/css-cascade-4/#all-shorthand">
<link rel="match" href="reference/ref-green-text.html">
<meta name="flags" content="">
<meta name="assert" content="Own 'color', preceded by 'all: inherit', overrides inherited 'color'.">
<style>
.outer {
color: red;
}
.inner {
all: inherit;
color: green;
}
</style>
</head>
<body>
<p class="outer"><span class="inner">Test passes if this text is green.</span></p>
</body>
</html>

View file

@ -0,0 +1,24 @@
<!DOCTYPE html>
<html>
<head>
<meta charset="utf-8">
<title>CSS Cascade: "color" property preceded by "all: initial"</title>
<link rel="help" href="https://www.w3.org/TR/css-cascade-4/#all-shorthand">
<link rel="match" href="reference/ref-green-text.html">
<meta name="flags" content="">
<meta name="assert" content="Own 'color', preceded by 'all: initial', overrides inherited 'color'.">
<style>
.outer {
color: red;
}
.inner {
all: initial;
color: green;
}
</style>
</head>
<body>
<p class="outer"><span class="inner">Test passes if this text is green.</span></p>
</body>
</html>

View file

@ -0,0 +1,24 @@
<!DOCTYPE html>
<html>
<head>
<meta charset="utf-8">
<title>CSS Cascade: "color" property preceded by "all: revert"</title>
<link rel="help" href="https://www.w3.org/TR/css-cascade-4/#all-shorthand">
<link rel="match" href="reference/ref-green-text.html">
<meta name="flags" content="">
<meta name="assert" content="Own 'color', preceded by 'all: revert', overrides inherited 'color'.">
<style>
.outer {
color: red;
}
.inner {
all: revert;
color: green;
}
</style>
</head>
<body>
<p class="outer"><span class="inner">Test passes if this text is green.</span></p>
</body>
</html>

View file

@ -0,0 +1,24 @@
<!DOCTYPE html>
<html>
<head>
<meta charset="utf-8">
<title>CSS Cascade: "color" property preceded by "all: unset"</title>
<link rel="help" href="https://www.w3.org/TR/css-cascade-4/#all-shorthand">
<link rel="match" href="reference/ref-green-text.html">
<meta name="flags" content="">
<meta name="assert" content="Own 'color', preceded by 'all: unset', overrides inherited 'color'.">
<style>
.outer {
color: red;
}
.inner {
all: unset;
color: green;
}
</style>
</head>
<body>
<p class="outer"><span class="inner">Test passes if this text is green.</span></p>
</body>
</html>

View file

@ -0,0 +1,9 @@
<!DOCTYPE html>
<meta charset="utf-8">
<title>Green text reference</title>
<style>
.test { color: green; }
</style>
<body>
<p class="test">Test passes if this text is green.</p>
</body>

View file

@ -6,7 +6,7 @@
<link rel="match" href="greentext-ref.html">
<meta name="assert" content="lab() with no alpha">
<style>
.test {color: lab(46.277 -47.562 48.583)} /* green (sRGB #008000) converted to Lab */
.test {color: lab(46.277% -47.562 48.583)} /* green (sRGB #008000) converted to Lab */
</style>
<body>
<p class="test">Test passes if this text is green</p>

View file

@ -7,7 +7,7 @@
<meta name="assert" content="lab() with no alpha">
<style>
.test { color: red; }
.test { color: lab(0 0 0)} /* black (sRGB #000000) converted to Lab */
.test { color: lab(0% 0 0)} /* black (sRGB #000000) converted to Lab */
</style>
<body>
<p class="test">Test passes if this text is black</p>

View file

@ -7,7 +7,7 @@
<meta name="assert" content="lab() with no alpha">
<style>
.test { color: red; background-color: #333; padding: 3px;}
.test { color: lab(100 0 0);} /* white (sRGB #FFFFFF) converted to Lab */
.test { color: lab(100% 0 0);} /* white (sRGB #FFFFFF) converted to Lab */
</style>
<body>
<p class="test">Test passes if this text is white</p>

View file

@ -7,7 +7,7 @@
<meta name="assert" content="lab() with no alpha, positive a axis">
<style>
.test { color: red; }
.test { color: lab(50 50 0)}
.test { color: lab(50% 50 0)}
.match { color: rgb(75.62%, 30.45%, 47.56%)} /* lab(50 50 0) converted to sRGB */
</style>
<body>

View file

@ -7,7 +7,7 @@
<meta name="assert" content="lab() with no alpha, negative a axis">
<style>
.test { color: red; }
.test { color: lab(70 -45 0)}
.test { color: lab(70% -45 0)}
.match { color: rgb(10.79%, 75.55%, 66.40%)} /* lab(70 -45 0) converted to sRGB */
</style>
<body>

View file

@ -7,7 +7,7 @@
<meta name="assert" content="lab() with no alpha, positive b axis">
<style>
.test { color: red; }
.test { color: lab(70 0 70)}
.test { color: lab(70% 0 70)}
.match { color: rgb(76.62%, 66.36%, 5.58%)} /* lab(70 0 70) converted to sRGB */
</style>
<body>

View file

@ -7,7 +7,7 @@
<meta name="assert" content="lab() with no alpha, negative b axis">
<style>
.test { color: red; }
.test { color: lab(55 0 -60)}
.test { color: lab(55% 0 -60)}
.match { color: rgb(12.81%, 53.10%, 92.76%)} /* lab(55 0 -60) converted to sRGB */
</style>
<body>

View file

@ -6,7 +6,7 @@
<link rel="match" href="greentext-ref.html">
<meta name="assert" content="lch() with no alpha">
<style>
.test {color: lch(46.277 67.945 134.427)} /* green (sRGB #008000) converted to LCH */
.test {color: lch(46.277% 67.945 134.427)} /* green (sRGB #008000) converted to LCH */
</style>
<body>
<p class="test">Test passes if this text is green</p>

View file

@ -7,7 +7,7 @@
<meta name="assert" content="lch() with no alpha">
<style>
.test { color: red; }
.test { color: lch(0 0 0)} /* black (sRGB #000000) converted to LCH */
.test { color: lch(0% 0 0)} /* black (sRGB #000000) converted to LCH */
</style>
<body>
<p class="test">Test passes if this text is black</p>

View file

@ -7,7 +7,7 @@
<meta name="assert" content="lch() with no alpha">
<style>
.test { color: red; background-color: #333; padding: 3px;}
.test { color: lch(100 0 0);} /* white (sRGB #FFFFFF) converted to LCH */
.test { color: lch(100% 0 0);} /* white (sRGB #FFFFFF) converted to LCH */
</style>
<body>
<p class="test">Test passes if this text is white</p>

View file

@ -7,7 +7,7 @@
<meta name="assert" content="lch() with no alpha, positive a axis">
<style>
.test { color: red; }
.test { color: lch(50 50 0)}
.test { color: lch(50% 50 0)}
.match { color: rgb(75.62%, 30.45%, 47.56%)} /* lch(50 50 0) converted to sRGB (happens to be the same as lab(50 50 0)*/
</style>
<body>

View file

@ -7,7 +7,7 @@
<meta name="assert" content="lch() with no alpha, negative a axis">
<style>
.test { color: red; }
.test { color: lch(70 45 -180)}
.test { color: lch(70% 45 -180)}
.match { color: rgb(10.79%, 75.55%, 66.40%)} /* lch(70 45 180) converted to sRGB */
</style>
<body>

View file

@ -7,7 +7,7 @@
<meta name="assert" content="lch() with no alpha, positive b axis">
<style>
.test { color: red; }
.test { color: lch(70 70 90)}
.test { color: lch(70% 70 90)}
.match { color: rgb(76.62%, 66.36%, 5.58%)} /* lch(70 70 90) converted to sRGB */
</style>
<body>

View file

@ -7,7 +7,7 @@
<meta name="assert" content="lab() with no alpha, negative b axis">
<style>
.test { color: red; }
.test { color: lch(56 58 275)}
.test { color: lch(56% 58 275)}
.match { color: rgb(12.81%, 53.10%, 92.76%)} /* lch(56 58 275) converted to sRGB */
</style>
<body>

View file

@ -302,7 +302,7 @@ promise_test(async t => {
// because mutating CSS transitions is not specced yet.
transition.effect = new KeyframeEffect(
div,
{ marginleft: ['0px', '100px'] },
{ marginLeft: ['0px', '100px'] },
{
duration: 100 * MS_PER_SEC,
endDelay: -50 * MS_PER_SEC,

View file

@ -0,0 +1,11 @@
<!DOCTYPE html>
<link rel="match" href="../reference/ref-filled-green-100px-square-only.html">
<link rel="help" href="https://drafts.csswg.org/css-sizing-3/#intrinsic-sizes">
<link rel="help" href="https://drafts.csswg.org/css-writing-modes-3/">
<meta name="assert" content="This test checks that the intrinsic size of an absolute positioned element is calculated correctly, with a replaced child that has a percentage block-size." />
<p>Test passes if there is a filled green square.</p>
<div style="position: relative; width: 200px; height: 100px;">
<div style="position: absolute; background: green; writing-mode: vertical-rl; width: 50%;">
<canvas style="width: 100%;" width=1 height=1></canvas>
</div>
</div>

View file

@ -76,8 +76,8 @@ On Linux, macOS or other UNIX-like system:
And on Windows (this must be run in a PowerShell session with Administrator privileges):
```bash
python wpt make-hosts-file | Out-File %SystemRoot%\System32\drivers\etc\hosts -Encoding ascii -Append
```
python wpt make-hosts-file | Out-File $env:SystemRoot\System32\drivers\etc\hosts -Encoding ascii -Append
```
If you are behind a proxy, you also need to make sure the domains above are

View file

@ -0,0 +1,39 @@
<!doctype html>
<html>
<head>
<title>
Check ServiceWorkers can set COOP/COEP headers for documents's responses
</title>
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
<script src="/common/utils.js"></script>
<script src="/service-workers/service-worker/resources/test-helpers.sub.js">
</script>
<script src="./resources/popup-coop-by-sw.js"> </script>
</head>
<body>
<script>
// The current document have COOP/COEP defined. A popup will be opened.
// Its response will be provided by a ServiceWorker. A browsing context
// group swap must happen if the popup's headers contains COOP/COEP headers.
popupCoopBySwTest("sw_normal, popup_normal",
sw_normal, popup_normal,
swap_browsing_context_group)
popupCoopBySwTest("sw_normal, popup_coop",
sw_normal, popup_coop,
keep_browsing_context_group)
popupCoopBySwTest("sw_coop, popup_normal",
sw_coop, popup_normal,
swap_browsing_context_group)
popupCoopBySwTest("sw_coop, popup_coop",
sw_coop, popup_coop,
keep_browsing_context_group)
</script>
</body>
</html>

View file

@ -0,0 +1,2 @@
Cross-Origin-Opener-Policy: same-origin
Cross-Origin-Embedder-Policy: require-corp

View file

@ -0,0 +1,39 @@
<!doctype html>
<html>
<head>
<title>
Check ServiceWorkers can set COOP/COEP headers for documents's responses
</title>
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
<script src="/common/utils.js"></script>
<script src="/service-workers/service-worker/resources/test-helpers.sub.js">
</script>
<script src="./resources/popup-coop-by-sw.js"> </script>
</head>
<body>
<script>
// The current document do not have COOP/COEP defined. A popup will be opened.
// Its response will be provided by a ServiceWorker. A browsing context group
// swap must happen if the popup's headers contains COOP/COEP headers.
popupCoopBySwTest("sw_normal, popup_normal",
sw_normal, popup_normal,
keep_browsing_context_group)
popupCoopBySwTest("sw_normal, popup_coop",
sw_normal, popup_coop,
swap_browsing_context_group)
popupCoopBySwTest("sw_coop, popup_normal",
sw_coop, popup_normal,
keep_browsing_context_group)
popupCoopBySwTest("sw_coop, popup_coop",
sw_coop, popup_coop,
swap_browsing_context_group)
</script>
</body>
</html>

View file

@ -0,0 +1,104 @@
const test_token = token();
const bc = new BroadcastChannel(test_token);
// Define a page served entirely from the ServiceWorker.
const popup_url = new URL("./resources/i-do-not-exist.html", location);
const popup_normal= {
'content-type': 'text/html',
};
const popup_coop = {
'content-type': 'text/html',
'cross-origin-embedder-policy': 'require-corp',
'cross-origin-opener-policy': 'same-origin',
};
const popup_body = `
<script>
const bc = new BroadcastChannel('${test_token}');
if (opener)
bc.postMessage("An opener is set");
else
bc.postMessage("No opener is set");
window.close();
</scrip`+`t>
`;
const header_coop= `|header(cross-origin-embedder-policy,same_origin)`;
const header_coep = `|header(cross-origin-opener-policy,require-corp)`;
const sw_normal = new URL("./resources/universal-worker.js?pipe=", location);
const sw_coop = sw_normal + header_coop + header_coep;
const swap_browsing_context_group = true;
const keep_browsing_context_group = false;
const SW_SCOPE = "./resources/"
// Send a message to the |worker|. Return a promise containing its response.
function executeCommandInServiceWorker(worker, command) {
const channel = new MessageChannel();
const response = new Promise(resolve => channel.port1.onmessage = resolve);
worker.postMessage(command, [ channel.port2 ]);
return response;
}
function popupCoopBySwTest(test_name,
// Test parameters
sw_url,
new_window_headers,
// Test expectations:
expected_browing_context_group) {
promise_test(async (t) => {
// Create a ServiceWorker and wait for its activation.
window.id = window.id == undefined ? 0 : window.id + 1;
const reg =
await service_worker_unregister_and_register(t, sw_url, SW_SCOPE);
t.add_cleanup(() => reg.unregister());
const worker = reg.installing || reg.waiting || reg.active;
wait_for_state(t, worker, 'active');
// Register a fetch handler. New documents loaded will use the
// |new_window_headers| from now and the custom response.
const worker_script = `
fetchHandler = event => {
const response = new Response(\`${popup_body}\`, {
status: 200,
headers: ${JSON.stringify(new_window_headers)},
});
event.respondWith(response);
};
message.ports[0].postMessage('done');
`;
const fetch_handler_registered =
await executeCommandInServiceWorker(worker, worker_script);
assert_equals(fetch_handler_registered.data, "done");
// Create a popup. The popup document's response is provided by the
// ServiceWorker.
bc_response = new Promise(resolve => bc.onmessage = resolve);
const openee = window.open(popup_url);
const {data} = await bc_response;
await reg.unregister();
if (expected_browing_context_group === keep_browsing_context_group) {
// From the openee point of view: The opener is preserved, because the
// popup is still in the same browsing context group.
assert_equals(data, "An opener is set");
return;
}
// From the openee point of view: There are no opener, because the new
// window lives in a different browsing context group.
assert_equals(data, "No opener is set");
// From the opener point of view: the openee must appear closed shortly
// after the popup navigation commit.
const openee_closed = new Promise(resolve => {
setInterval(() => {
if (openee.closed)
resolve();
}, 100);
});
await openee_closed;
}, test_name);
}

View file

@ -0,0 +1,2 @@
onmessage = message => eval(message.data);
onfetch = event => fetchHandler(event);

View file

@ -0,0 +1,39 @@
<!DOCTYPE html>
<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec mixed-content/` -->
<html>
<head>
<title>Mixed-Content: Blockable content</title>
<meta charset='utf-8'>
<meta name="description" content="Test behavior of blockable content.">
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
<link rel="help" href="http://www.w3.org/TR/mixed-content/#category-blockable">
<meta name="assert" content="Mixed-Content: Expects blocked for fetch to cross-http origin and keep-scheme redirection from https context.">
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
<script src="/common/security-features/resources/common.sub.js"></script>
<script src="../../../../generic/test-case.sub.js"></script>
</head>
<body>
<script>
TestCase(
{
"expectation": "blocked",
"origin": "cross-http",
"redirection": "keep-scheme",
"source_context_list": [
{
"policyDeliveries": [],
"sourceContextType": "sharedworker-classic"
}
],
"source_scheme": "https",
"subresource": "fetch",
"subresource_policy_deliveries": []
},
document.querySelector("meta[name=assert]").content,
new SanityChecker()
).start();
</script>
<div id="log"></div>
</body>
</html>

View file

@ -0,0 +1 @@
Content-Security-Policy: block-all-mixed-content

View file

@ -0,0 +1,39 @@
<!DOCTYPE html>
<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec mixed-content/` -->
<html>
<head>
<title>Mixed-Content: Blockable content</title>
<meta charset='utf-8'>
<meta name="description" content="Test behavior of blockable content.">
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
<link rel="help" href="http://www.w3.org/TR/mixed-content/#category-blockable">
<meta name="assert" content="Mixed-Content: Expects blocked for fetch to cross-http origin and no-redirect redirection from https context.">
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
<script src="/common/security-features/resources/common.sub.js"></script>
<script src="../../../../generic/test-case.sub.js"></script>
</head>
<body>
<script>
TestCase(
{
"expectation": "blocked",
"origin": "cross-http",
"redirection": "no-redirect",
"source_context_list": [
{
"policyDeliveries": [],
"sourceContextType": "sharedworker-classic"
}
],
"source_scheme": "https",
"subresource": "fetch",
"subresource_policy_deliveries": []
},
document.querySelector("meta[name=assert]").content,
new SanityChecker()
).start();
</script>
<div id="log"></div>
</body>
</html>

View file

@ -0,0 +1 @@
Content-Security-Policy: block-all-mixed-content

View file

@ -0,0 +1,39 @@
<!DOCTYPE html>
<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec mixed-content/` -->
<html>
<head>
<title>Mixed-Content: Blockable content</title>
<meta charset='utf-8'>
<meta name="description" content="Test behavior of blockable content.">
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
<link rel="help" href="http://www.w3.org/TR/mixed-content/#category-blockable">
<meta name="assert" content="Mixed-Content: Expects blocked for fetch to cross-http origin and swap-scheme redirection from https context.">
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
<script src="/common/security-features/resources/common.sub.js"></script>
<script src="../../../../generic/test-case.sub.js"></script>
</head>
<body>
<script>
TestCase(
{
"expectation": "blocked",
"origin": "cross-http",
"redirection": "swap-scheme",
"source_context_list": [
{
"policyDeliveries": [],
"sourceContextType": "sharedworker-classic"
}
],
"source_scheme": "https",
"subresource": "fetch",
"subresource_policy_deliveries": []
},
document.querySelector("meta[name=assert]").content,
new SanityChecker()
).start();
</script>
<div id="log"></div>
</body>
</html>

View file

@ -0,0 +1 @@
Content-Security-Policy: block-all-mixed-content

View file

@ -0,0 +1,39 @@
<!DOCTYPE html>
<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec mixed-content/` -->
<html>
<head>
<title>Mixed-Content: Blockable content</title>
<meta charset='utf-8'>
<meta name="description" content="Test behavior of blockable content.">
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
<link rel="help" href="http://www.w3.org/TR/mixed-content/#category-blockable">
<meta name="assert" content="Mixed-Content: Expects blocked for fetch to same-http origin and keep-scheme redirection from https context.">
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
<script src="/common/security-features/resources/common.sub.js"></script>
<script src="../../../../generic/test-case.sub.js"></script>
</head>
<body>
<script>
TestCase(
{
"expectation": "blocked",
"origin": "same-http",
"redirection": "keep-scheme",
"source_context_list": [
{
"policyDeliveries": [],
"sourceContextType": "sharedworker-classic"
}
],
"source_scheme": "https",
"subresource": "fetch",
"subresource_policy_deliveries": []
},
document.querySelector("meta[name=assert]").content,
new SanityChecker()
).start();
</script>
<div id="log"></div>
</body>
</html>

View file

@ -0,0 +1 @@
Content-Security-Policy: block-all-mixed-content

View file

@ -0,0 +1,39 @@
<!DOCTYPE html>
<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec mixed-content/` -->
<html>
<head>
<title>Mixed-Content: Blockable content</title>
<meta charset='utf-8'>
<meta name="description" content="Test behavior of blockable content.">
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
<link rel="help" href="http://www.w3.org/TR/mixed-content/#category-blockable">
<meta name="assert" content="Mixed-Content: Expects blocked for fetch to same-http origin and no-redirect redirection from https context.">
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
<script src="/common/security-features/resources/common.sub.js"></script>
<script src="../../../../generic/test-case.sub.js"></script>
</head>
<body>
<script>
TestCase(
{
"expectation": "blocked",
"origin": "same-http",
"redirection": "no-redirect",
"source_context_list": [
{
"policyDeliveries": [],
"sourceContextType": "sharedworker-classic"
}
],
"source_scheme": "https",
"subresource": "fetch",
"subresource_policy_deliveries": []
},
document.querySelector("meta[name=assert]").content,
new SanityChecker()
).start();
</script>
<div id="log"></div>
</body>
</html>

View file

@ -0,0 +1 @@
Content-Security-Policy: block-all-mixed-content

View file

@ -0,0 +1,39 @@
<!DOCTYPE html>
<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec mixed-content/` -->
<html>
<head>
<title>Mixed-Content: Blockable content</title>
<meta charset='utf-8'>
<meta name="description" content="Test behavior of blockable content.">
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
<link rel="help" href="http://www.w3.org/TR/mixed-content/#category-blockable">
<meta name="assert" content="Mixed-Content: Expects blocked for fetch to same-http origin and swap-scheme redirection from https context.">
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
<script src="/common/security-features/resources/common.sub.js"></script>
<script src="../../../../generic/test-case.sub.js"></script>
</head>
<body>
<script>
TestCase(
{
"expectation": "blocked",
"origin": "same-http",
"redirection": "swap-scheme",
"source_context_list": [
{
"policyDeliveries": [],
"sourceContextType": "sharedworker-classic"
}
],
"source_scheme": "https",
"subresource": "fetch",
"subresource_policy_deliveries": []
},
document.querySelector("meta[name=assert]").content,
new SanityChecker()
).start();
</script>
<div id="log"></div>
</body>
</html>

View file

@ -0,0 +1 @@
Content-Security-Policy: block-all-mixed-content

View file

@ -0,0 +1,39 @@
<!DOCTYPE html>
<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec mixed-content/` -->
<html>
<head>
<title>Mixed-Content: Allowed content</title>
<meta charset='utf-8'>
<meta name="description" content="Test behavior of allowed content.">
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
<link rel="help" href="http://www.w3.org/TR/mixed-content/">
<meta name="assert" content="Mixed-Content: Expects allowed for fetch to same-https origin and keep-scheme redirection from https context.">
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
<script src="/common/security-features/resources/common.sub.js"></script>
<script src="../../../../generic/test-case.sub.js"></script>
</head>
<body>
<script>
TestCase(
{
"expectation": "allowed",
"origin": "same-https",
"redirection": "keep-scheme",
"source_context_list": [
{
"policyDeliveries": [],
"sourceContextType": "sharedworker-classic"
}
],
"source_scheme": "https",
"subresource": "fetch",
"subresource_policy_deliveries": []
},
document.querySelector("meta[name=assert]").content,
new SanityChecker()
).start();
</script>
<div id="log"></div>
</body>
</html>

View file

@ -0,0 +1 @@
Content-Security-Policy: block-all-mixed-content

View file

@ -0,0 +1,39 @@
<!DOCTYPE html>
<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec mixed-content/` -->
<html>
<head>
<title>Mixed-Content: Allowed content</title>
<meta charset='utf-8'>
<meta name="description" content="Test behavior of allowed content.">
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
<link rel="help" href="http://www.w3.org/TR/mixed-content/">
<meta name="assert" content="Mixed-Content: Expects allowed for fetch to same-https origin and no-redirect redirection from https context.">
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
<script src="/common/security-features/resources/common.sub.js"></script>
<script src="../../../../generic/test-case.sub.js"></script>
</head>
<body>
<script>
TestCase(
{
"expectation": "allowed",
"origin": "same-https",
"redirection": "no-redirect",
"source_context_list": [
{
"policyDeliveries": [],
"sourceContextType": "sharedworker-classic"
}
],
"source_scheme": "https",
"subresource": "fetch",
"subresource_policy_deliveries": []
},
document.querySelector("meta[name=assert]").content,
new SanityChecker()
).start();
</script>
<div id="log"></div>
</body>
</html>

View file

@ -0,0 +1 @@
Content-Security-Policy: block-all-mixed-content

View file

@ -0,0 +1,39 @@
<!DOCTYPE html>
<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec mixed-content/` -->
<html>
<head>
<title>Mixed-Content: Blockable content</title>
<meta charset='utf-8'>
<meta name="description" content="Test behavior of blockable content.">
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
<link rel="help" href="http://www.w3.org/TR/mixed-content/#category-blockable">
<meta name="assert" content="Mixed-Content: Expects blocked for websocket to cross-ws origin and no-redirect redirection from https context.">
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
<script src="/common/security-features/resources/common.sub.js"></script>
<script src="../../../../generic/test-case.sub.js"></script>
</head>
<body>
<script>
TestCase(
{
"expectation": "blocked",
"origin": "cross-ws",
"redirection": "no-redirect",
"source_context_list": [
{
"policyDeliveries": [],
"sourceContextType": "sharedworker-classic"
}
],
"source_scheme": "https",
"subresource": "websocket",
"subresource_policy_deliveries": []
},
document.querySelector("meta[name=assert]").content,
new SanityChecker()
).start();
</script>
<div id="log"></div>
</body>
</html>

View file

@ -0,0 +1 @@
Content-Security-Policy: block-all-mixed-content

View file

@ -0,0 +1,39 @@
<!DOCTYPE html>
<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec mixed-content/` -->
<html>
<head>
<title>Mixed-Content: Blockable content</title>
<meta charset='utf-8'>
<meta name="description" content="Test behavior of blockable content.">
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
<link rel="help" href="http://www.w3.org/TR/mixed-content/#category-blockable">
<meta name="assert" content="Mixed-Content: Expects blocked for websocket to same-ws origin and no-redirect redirection from https context.">
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
<script src="/common/security-features/resources/common.sub.js"></script>
<script src="../../../../generic/test-case.sub.js"></script>
</head>
<body>
<script>
TestCase(
{
"expectation": "blocked",
"origin": "same-ws",
"redirection": "no-redirect",
"source_context_list": [
{
"policyDeliveries": [],
"sourceContextType": "sharedworker-classic"
}
],
"source_scheme": "https",
"subresource": "websocket",
"subresource_policy_deliveries": []
},
document.querySelector("meta[name=assert]").content,
new SanityChecker()
).start();
</script>
<div id="log"></div>
</body>
</html>

View file

@ -0,0 +1 @@
Content-Security-Policy: block-all-mixed-content

View file

@ -0,0 +1,39 @@
<!DOCTYPE html>
<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec mixed-content/` -->
<html>
<head>
<title>Mixed-Content: Allowed content</title>
<meta charset='utf-8'>
<meta name="description" content="Test behavior of allowed content.">
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
<link rel="help" href="http://www.w3.org/TR/mixed-content/">
<meta name="assert" content="Mixed-Content: Expects allowed for websocket to same-wss origin and no-redirect redirection from https context.">
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
<script src="/common/security-features/resources/common.sub.js"></script>
<script src="../../../../generic/test-case.sub.js"></script>
</head>
<body>
<script>
TestCase(
{
"expectation": "allowed",
"origin": "same-wss",
"redirection": "no-redirect",
"source_context_list": [
{
"policyDeliveries": [],
"sourceContextType": "sharedworker-classic"
}
],
"source_scheme": "https",
"subresource": "websocket",
"subresource_policy_deliveries": []
},
document.querySelector("meta[name=assert]").content,
new SanityChecker()
).start();
</script>
<div id="log"></div>
</body>
</html>

View file

@ -0,0 +1 @@
Content-Security-Policy: block-all-mixed-content

View file

@ -0,0 +1,39 @@
<!DOCTYPE html>
<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec mixed-content/` -->
<html>
<head>
<title>Mixed-Content: Blockable content</title>
<meta charset='utf-8'>
<meta name="description" content="Test behavior of blockable content.">
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
<link rel="help" href="http://www.w3.org/TR/mixed-content/#category-blockable">
<meta name="assert" content="Mixed-Content: Expects blocked for xhr to cross-http origin and keep-scheme redirection from https context.">
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
<script src="/common/security-features/resources/common.sub.js"></script>
<script src="../../../../generic/test-case.sub.js"></script>
</head>
<body>
<script>
TestCase(
{
"expectation": "blocked",
"origin": "cross-http",
"redirection": "keep-scheme",
"source_context_list": [
{
"policyDeliveries": [],
"sourceContextType": "sharedworker-classic"
}
],
"source_scheme": "https",
"subresource": "xhr",
"subresource_policy_deliveries": []
},
document.querySelector("meta[name=assert]").content,
new SanityChecker()
).start();
</script>
<div id="log"></div>
</body>
</html>

View file

@ -0,0 +1 @@
Content-Security-Policy: block-all-mixed-content

View file

@ -0,0 +1,39 @@
<!DOCTYPE html>
<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec mixed-content/` -->
<html>
<head>
<title>Mixed-Content: Blockable content</title>
<meta charset='utf-8'>
<meta name="description" content="Test behavior of blockable content.">
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
<link rel="help" href="http://www.w3.org/TR/mixed-content/#category-blockable">
<meta name="assert" content="Mixed-Content: Expects blocked for xhr to cross-http origin and no-redirect redirection from https context.">
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
<script src="/common/security-features/resources/common.sub.js"></script>
<script src="../../../../generic/test-case.sub.js"></script>
</head>
<body>
<script>
TestCase(
{
"expectation": "blocked",
"origin": "cross-http",
"redirection": "no-redirect",
"source_context_list": [
{
"policyDeliveries": [],
"sourceContextType": "sharedworker-classic"
}
],
"source_scheme": "https",
"subresource": "xhr",
"subresource_policy_deliveries": []
},
document.querySelector("meta[name=assert]").content,
new SanityChecker()
).start();
</script>
<div id="log"></div>
</body>
</html>

View file

@ -0,0 +1 @@
Content-Security-Policy: block-all-mixed-content

View file

@ -0,0 +1,39 @@
<!DOCTYPE html>
<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec mixed-content/` -->
<html>
<head>
<title>Mixed-Content: Blockable content</title>
<meta charset='utf-8'>
<meta name="description" content="Test behavior of blockable content.">
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
<link rel="help" href="http://www.w3.org/TR/mixed-content/#category-blockable">
<meta name="assert" content="Mixed-Content: Expects blocked for xhr to cross-http origin and swap-scheme redirection from https context.">
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
<script src="/common/security-features/resources/common.sub.js"></script>
<script src="../../../../generic/test-case.sub.js"></script>
</head>
<body>
<script>
TestCase(
{
"expectation": "blocked",
"origin": "cross-http",
"redirection": "swap-scheme",
"source_context_list": [
{
"policyDeliveries": [],
"sourceContextType": "sharedworker-classic"
}
],
"source_scheme": "https",
"subresource": "xhr",
"subresource_policy_deliveries": []
},
document.querySelector("meta[name=assert]").content,
new SanityChecker()
).start();
</script>
<div id="log"></div>
</body>
</html>

View file

@ -0,0 +1 @@
Content-Security-Policy: block-all-mixed-content

View file

@ -0,0 +1,39 @@
<!DOCTYPE html>
<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec mixed-content/` -->
<html>
<head>
<title>Mixed-Content: Blockable content</title>
<meta charset='utf-8'>
<meta name="description" content="Test behavior of blockable content.">
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
<link rel="help" href="http://www.w3.org/TR/mixed-content/#category-blockable">
<meta name="assert" content="Mixed-Content: Expects blocked for xhr to same-http origin and keep-scheme redirection from https context.">
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
<script src="/common/security-features/resources/common.sub.js"></script>
<script src="../../../../generic/test-case.sub.js"></script>
</head>
<body>
<script>
TestCase(
{
"expectation": "blocked",
"origin": "same-http",
"redirection": "keep-scheme",
"source_context_list": [
{
"policyDeliveries": [],
"sourceContextType": "sharedworker-classic"
}
],
"source_scheme": "https",
"subresource": "xhr",
"subresource_policy_deliveries": []
},
document.querySelector("meta[name=assert]").content,
new SanityChecker()
).start();
</script>
<div id="log"></div>
</body>
</html>

View file

@ -0,0 +1 @@
Content-Security-Policy: block-all-mixed-content

View file

@ -0,0 +1,39 @@
<!DOCTYPE html>
<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec mixed-content/` -->
<html>
<head>
<title>Mixed-Content: Blockable content</title>
<meta charset='utf-8'>
<meta name="description" content="Test behavior of blockable content.">
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
<link rel="help" href="http://www.w3.org/TR/mixed-content/#category-blockable">
<meta name="assert" content="Mixed-Content: Expects blocked for xhr to same-http origin and no-redirect redirection from https context.">
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
<script src="/common/security-features/resources/common.sub.js"></script>
<script src="../../../../generic/test-case.sub.js"></script>
</head>
<body>
<script>
TestCase(
{
"expectation": "blocked",
"origin": "same-http",
"redirection": "no-redirect",
"source_context_list": [
{
"policyDeliveries": [],
"sourceContextType": "sharedworker-classic"
}
],
"source_scheme": "https",
"subresource": "xhr",
"subresource_policy_deliveries": []
},
document.querySelector("meta[name=assert]").content,
new SanityChecker()
).start();
</script>
<div id="log"></div>
</body>
</html>

View file

@ -0,0 +1 @@
Content-Security-Policy: block-all-mixed-content

View file

@ -0,0 +1,39 @@
<!DOCTYPE html>
<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec mixed-content/` -->
<html>
<head>
<title>Mixed-Content: Blockable content</title>
<meta charset='utf-8'>
<meta name="description" content="Test behavior of blockable content.">
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
<link rel="help" href="http://www.w3.org/TR/mixed-content/#category-blockable">
<meta name="assert" content="Mixed-Content: Expects blocked for xhr to same-http origin and swap-scheme redirection from https context.">
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
<script src="/common/security-features/resources/common.sub.js"></script>
<script src="../../../../generic/test-case.sub.js"></script>
</head>
<body>
<script>
TestCase(
{
"expectation": "blocked",
"origin": "same-http",
"redirection": "swap-scheme",
"source_context_list": [
{
"policyDeliveries": [],
"sourceContextType": "sharedworker-classic"
}
],
"source_scheme": "https",
"subresource": "xhr",
"subresource_policy_deliveries": []
},
document.querySelector("meta[name=assert]").content,
new SanityChecker()
).start();
</script>
<div id="log"></div>
</body>
</html>

View file

@ -0,0 +1 @@
Content-Security-Policy: block-all-mixed-content

View file

@ -0,0 +1,39 @@
<!DOCTYPE html>
<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec mixed-content/` -->
<html>
<head>
<title>Mixed-Content: Allowed content</title>
<meta charset='utf-8'>
<meta name="description" content="Test behavior of allowed content.">
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
<link rel="help" href="http://www.w3.org/TR/mixed-content/">
<meta name="assert" content="Mixed-Content: Expects allowed for xhr to same-https origin and keep-scheme redirection from https context.">
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
<script src="/common/security-features/resources/common.sub.js"></script>
<script src="../../../../generic/test-case.sub.js"></script>
</head>
<body>
<script>
TestCase(
{
"expectation": "allowed",
"origin": "same-https",
"redirection": "keep-scheme",
"source_context_list": [
{
"policyDeliveries": [],
"sourceContextType": "sharedworker-classic"
}
],
"source_scheme": "https",
"subresource": "xhr",
"subresource_policy_deliveries": []
},
document.querySelector("meta[name=assert]").content,
new SanityChecker()
).start();
</script>
<div id="log"></div>
</body>
</html>

View file

@ -0,0 +1 @@
Content-Security-Policy: block-all-mixed-content

View file

@ -0,0 +1,39 @@
<!DOCTYPE html>
<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec mixed-content/` -->
<html>
<head>
<title>Mixed-Content: Allowed content</title>
<meta charset='utf-8'>
<meta name="description" content="Test behavior of allowed content.">
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
<link rel="help" href="http://www.w3.org/TR/mixed-content/">
<meta name="assert" content="Mixed-Content: Expects allowed for xhr to same-https origin and no-redirect redirection from https context.">
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
<script src="/common/security-features/resources/common.sub.js"></script>
<script src="../../../../generic/test-case.sub.js"></script>
</head>
<body>
<script>
TestCase(
{
"expectation": "allowed",
"origin": "same-https",
"redirection": "no-redirect",
"source_context_list": [
{
"policyDeliveries": [],
"sourceContextType": "sharedworker-classic"
}
],
"source_scheme": "https",
"subresource": "xhr",
"subresource_policy_deliveries": []
},
document.querySelector("meta[name=assert]").content,
new SanityChecker()
).start();
</script>
<div id="log"></div>
</body>
</html>

View file

@ -0,0 +1 @@
Content-Security-Policy: block-all-mixed-content

View file

@ -0,0 +1,39 @@
<!DOCTYPE html>
<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec mixed-content/` -->
<html>
<head>
<title>Mixed-Content: Blockable content</title>
<meta charset='utf-8'>
<meta name="description" content="Test behavior of blockable content.">
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
<link rel="help" href="http://www.w3.org/TR/mixed-content/#category-blockable">
<meta name="assert" content="Mixed-Content: Expects blocked for fetch to cross-http origin and keep-scheme redirection from https context.">
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
<script src="/common/security-features/resources/common.sub.js"></script>
<script src="../../../../generic/test-case.sub.js"></script>
</head>
<body>
<script>
TestCase(
{
"expectation": "blocked",
"origin": "cross-http",
"redirection": "keep-scheme",
"source_context_list": [
{
"policyDeliveries": [],
"sourceContextType": "sharedworker-module"
}
],
"source_scheme": "https",
"subresource": "fetch",
"subresource_policy_deliveries": []
},
document.querySelector("meta[name=assert]").content,
new SanityChecker()
).start();
</script>
<div id="log"></div>
</body>
</html>

View file

@ -0,0 +1 @@
Content-Security-Policy: block-all-mixed-content

View file

@ -0,0 +1,39 @@
<!DOCTYPE html>
<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec mixed-content/` -->
<html>
<head>
<title>Mixed-Content: Blockable content</title>
<meta charset='utf-8'>
<meta name="description" content="Test behavior of blockable content.">
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
<link rel="help" href="http://www.w3.org/TR/mixed-content/#category-blockable">
<meta name="assert" content="Mixed-Content: Expects blocked for fetch to cross-http origin and no-redirect redirection from https context.">
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
<script src="/common/security-features/resources/common.sub.js"></script>
<script src="../../../../generic/test-case.sub.js"></script>
</head>
<body>
<script>
TestCase(
{
"expectation": "blocked",
"origin": "cross-http",
"redirection": "no-redirect",
"source_context_list": [
{
"policyDeliveries": [],
"sourceContextType": "sharedworker-module"
}
],
"source_scheme": "https",
"subresource": "fetch",
"subresource_policy_deliveries": []
},
document.querySelector("meta[name=assert]").content,
new SanityChecker()
).start();
</script>
<div id="log"></div>
</body>
</html>

View file

@ -0,0 +1 @@
Content-Security-Policy: block-all-mixed-content

View file

@ -0,0 +1,39 @@
<!DOCTYPE html>
<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec mixed-content/` -->
<html>
<head>
<title>Mixed-Content: Blockable content</title>
<meta charset='utf-8'>
<meta name="description" content="Test behavior of blockable content.">
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
<link rel="help" href="http://www.w3.org/TR/mixed-content/#category-blockable">
<meta name="assert" content="Mixed-Content: Expects blocked for fetch to cross-http origin and swap-scheme redirection from https context.">
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
<script src="/common/security-features/resources/common.sub.js"></script>
<script src="../../../../generic/test-case.sub.js"></script>
</head>
<body>
<script>
TestCase(
{
"expectation": "blocked",
"origin": "cross-http",
"redirection": "swap-scheme",
"source_context_list": [
{
"policyDeliveries": [],
"sourceContextType": "sharedworker-module"
}
],
"source_scheme": "https",
"subresource": "fetch",
"subresource_policy_deliveries": []
},
document.querySelector("meta[name=assert]").content,
new SanityChecker()
).start();
</script>
<div id="log"></div>
</body>
</html>

View file

@ -0,0 +1 @@
Content-Security-Policy: block-all-mixed-content

View file

@ -0,0 +1,39 @@
<!DOCTYPE html>
<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec mixed-content/` -->
<html>
<head>
<title>Mixed-Content: Blockable content</title>
<meta charset='utf-8'>
<meta name="description" content="Test behavior of blockable content.">
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
<link rel="help" href="http://www.w3.org/TR/mixed-content/#category-blockable">
<meta name="assert" content="Mixed-Content: Expects blocked for fetch to same-http origin and keep-scheme redirection from https context.">
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
<script src="/common/security-features/resources/common.sub.js"></script>
<script src="../../../../generic/test-case.sub.js"></script>
</head>
<body>
<script>
TestCase(
{
"expectation": "blocked",
"origin": "same-http",
"redirection": "keep-scheme",
"source_context_list": [
{
"policyDeliveries": [],
"sourceContextType": "sharedworker-module"
}
],
"source_scheme": "https",
"subresource": "fetch",
"subresource_policy_deliveries": []
},
document.querySelector("meta[name=assert]").content,
new SanityChecker()
).start();
</script>
<div id="log"></div>
</body>
</html>

View file

@ -0,0 +1 @@
Content-Security-Policy: block-all-mixed-content

View file

@ -0,0 +1,39 @@
<!DOCTYPE html>
<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec mixed-content/` -->
<html>
<head>
<title>Mixed-Content: Blockable content</title>
<meta charset='utf-8'>
<meta name="description" content="Test behavior of blockable content.">
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
<link rel="help" href="http://www.w3.org/TR/mixed-content/#category-blockable">
<meta name="assert" content="Mixed-Content: Expects blocked for fetch to same-http origin and no-redirect redirection from https context.">
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
<script src="/common/security-features/resources/common.sub.js"></script>
<script src="../../../../generic/test-case.sub.js"></script>
</head>
<body>
<script>
TestCase(
{
"expectation": "blocked",
"origin": "same-http",
"redirection": "no-redirect",
"source_context_list": [
{
"policyDeliveries": [],
"sourceContextType": "sharedworker-module"
}
],
"source_scheme": "https",
"subresource": "fetch",
"subresource_policy_deliveries": []
},
document.querySelector("meta[name=assert]").content,
new SanityChecker()
).start();
</script>
<div id="log"></div>
</body>
</html>

View file

@ -0,0 +1 @@
Content-Security-Policy: block-all-mixed-content

View file

@ -0,0 +1,39 @@
<!DOCTYPE html>
<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec mixed-content/` -->
<html>
<head>
<title>Mixed-Content: Blockable content</title>
<meta charset='utf-8'>
<meta name="description" content="Test behavior of blockable content.">
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
<link rel="help" href="http://www.w3.org/TR/mixed-content/#category-blockable">
<meta name="assert" content="Mixed-Content: Expects blocked for fetch to same-http origin and swap-scheme redirection from https context.">
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
<script src="/common/security-features/resources/common.sub.js"></script>
<script src="../../../../generic/test-case.sub.js"></script>
</head>
<body>
<script>
TestCase(
{
"expectation": "blocked",
"origin": "same-http",
"redirection": "swap-scheme",
"source_context_list": [
{
"policyDeliveries": [],
"sourceContextType": "sharedworker-module"
}
],
"source_scheme": "https",
"subresource": "fetch",
"subresource_policy_deliveries": []
},
document.querySelector("meta[name=assert]").content,
new SanityChecker()
).start();
</script>
<div id="log"></div>
</body>
</html>

View file

@ -0,0 +1 @@
Content-Security-Policy: block-all-mixed-content

Some files were not shown because too many files have changed in this diff Show more