mirror of
https://github.com/servo/servo.git
synced 2025-08-03 04:30:10 +01:00
Update web-platform-tests to revision 7ed49cff4d031720f829c01df837ed7a09ad5c60
This commit is contained in:
parent
33f0040496
commit
62a9bebeef
220 changed files with 8623 additions and 559 deletions
|
@ -801,6 +801,10 @@
|
|||
"path": "html/semantics/grouping-content/the-li-element/grouping-li-novalue-manual.html",
|
||||
"url": "/html/semantics/grouping-content/the-li-element/grouping-li-novalue-manual.html"
|
||||
},
|
||||
{
|
||||
"path": "html/semantics/selectors/pseudo-classes/checked-001-manual.html",
|
||||
"url": "/html/semantics/selectors/pseudo-classes/checked-001-manual.html"
|
||||
},
|
||||
{
|
||||
"path": "html/webappapis/scripting/event-loops/task_microtask_ordering-manual.html",
|
||||
"url": "/html/webappapis/scripting/event-loops/task_microtask_ordering-manual.html"
|
||||
|
@ -12159,6 +12163,10 @@
|
|||
"path": "WebIDL/ecmascript-binding/es-exceptions/exceptions.html",
|
||||
"url": "/WebIDL/ecmascript-binding/es-exceptions/exceptions.html"
|
||||
},
|
||||
{
|
||||
"path": "WebIDL/ecmascript-binding/has-instance.html",
|
||||
"url": "/WebIDL/ecmascript-binding/has-instance.html"
|
||||
},
|
||||
{
|
||||
"path": "XMLHttpRequest/FormData-append.html",
|
||||
"url": "/XMLHttpRequest/FormData-append.html"
|
||||
|
@ -12547,6 +12555,10 @@
|
|||
"path": "XMLHttpRequest/responsexml-document-properties.htm",
|
||||
"url": "/XMLHttpRequest/responsexml-document-properties.htm"
|
||||
},
|
||||
{
|
||||
"path": "XMLHttpRequest/responsexml-get-twice.htm",
|
||||
"url": "/XMLHttpRequest/responsexml-get-twice.htm"
|
||||
},
|
||||
{
|
||||
"path": "XMLHttpRequest/responsexml-media-type.htm",
|
||||
"url": "/XMLHttpRequest/responsexml-media-type.htm"
|
||||
|
@ -13535,6 +13547,30 @@
|
|||
"path": "content-security-policy/svg/svg-policy-with-resource.html",
|
||||
"url": "/content-security-policy/svg/svg-policy-with-resource.html"
|
||||
},
|
||||
{
|
||||
"path": "cookies/secure/set-from-dom.https.sub.html",
|
||||
"url": "/cookies/secure/set-from-dom.https.sub.html"
|
||||
},
|
||||
{
|
||||
"path": "cookies/secure/set-from-dom.sub.html",
|
||||
"url": "/cookies/secure/set-from-dom.sub.html"
|
||||
},
|
||||
{
|
||||
"path": "cookies/secure/set-from-http.https.sub.html",
|
||||
"url": "/cookies/secure/set-from-http.https.sub.html"
|
||||
},
|
||||
{
|
||||
"path": "cookies/secure/set-from-http.sub.html",
|
||||
"url": "/cookies/secure/set-from-http.sub.html"
|
||||
},
|
||||
{
|
||||
"path": "cookies/secure/set-from-ws.https.sub.html",
|
||||
"url": "/cookies/secure/set-from-ws.https.sub.html"
|
||||
},
|
||||
{
|
||||
"path": "cookies/secure/set-from-wss.https.sub.html",
|
||||
"url": "/cookies/secure/set-from-wss.https.sub.html"
|
||||
},
|
||||
{
|
||||
"path": "cors/allow-headers.htm",
|
||||
"url": "/cors/allow-headers.htm"
|
||||
|
@ -18543,6 +18579,10 @@
|
|||
"path": "html/semantics/embedded-content/the-img-element/srcset/select-an-image-source.html",
|
||||
"url": "/html/semantics/embedded-content/the-img-element/srcset/select-an-image-source.html"
|
||||
},
|
||||
{
|
||||
"path": "html/semantics/embedded-content/the-img-element/update-media.html",
|
||||
"url": "/html/semantics/embedded-content/the-img-element/update-media.html"
|
||||
},
|
||||
{
|
||||
"path": "html/semantics/embedded-content/the-img-element/update-the-image-data/fail-to-resolve.html",
|
||||
"url": "/html/semantics/embedded-content/the-img-element/update-the-image-data/fail-to-resolve.html"
|
||||
|
@ -19235,6 +19275,10 @@
|
|||
"path": "html/semantics/selectors/pseudo-classes/focus.html",
|
||||
"url": "/html/semantics/selectors/pseudo-classes/focus.html"
|
||||
},
|
||||
{
|
||||
"path": "html/semantics/selectors/pseudo-classes/indeterminate-radio.html",
|
||||
"url": "/html/semantics/selectors/pseudo-classes/indeterminate-radio.html"
|
||||
},
|
||||
{
|
||||
"path": "html/semantics/selectors/pseudo-classes/indeterminate.html",
|
||||
"url": "/html/semantics/selectors/pseudo-classes/indeterminate.html"
|
||||
|
@ -22035,6 +22079,14 @@
|
|||
"path": "pointerlock/idlharness.html",
|
||||
"url": "/pointerlock/idlharness.html"
|
||||
},
|
||||
{
|
||||
"path": "presentation-api/controlling-ua/idlharness.html",
|
||||
"url": "/presentation-api/controlling-ua/idlharness.html"
|
||||
},
|
||||
{
|
||||
"path": "presentation-api/receiving-ua/idlharness.html",
|
||||
"url": "/presentation-api/receiving-ua/idlharness.html"
|
||||
},
|
||||
{
|
||||
"path": "progress-events/constructor.html",
|
||||
"url": "/progress-events/constructor.html"
|
||||
|
@ -22095,6 +22147,10 @@
|
|||
"path": "referrer-policy/generic/subresource-test/area-navigate.html",
|
||||
"url": "/referrer-policy/generic/subresource-test/area-navigate.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/generic/subresource-test/attr-referrer-invalid-value.html",
|
||||
"url": "/referrer-policy/generic/subresource-test/attr-referrer-invalid-value.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/generic/subresource-test/fetch-messaging.html",
|
||||
"url": "/referrer-policy/generic/subresource-test/fetch-messaging.html"
|
||||
|
@ -22123,6 +22179,102 @@
|
|||
"path": "referrer-policy/generic/subresource-test/xhr-messaging.html",
|
||||
"url": "/referrer-policy/generic/subresource-test/xhr-messaging.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-http/iframe-tag/insecure-protocol.keep-origin-redirect.http.html",
|
||||
"url": "/referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-http/iframe-tag/insecure-protocol.keep-origin-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-http/iframe-tag/insecure-protocol.no-redirect.http.html",
|
||||
"url": "/referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-http/iframe-tag/insecure-protocol.no-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-http/iframe-tag/insecure-protocol.swap-origin-redirect.http.html",
|
||||
"url": "/referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-http/iframe-tag/insecure-protocol.swap-origin-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-http/img-tag/insecure-protocol.keep-origin-redirect.http.html",
|
||||
"url": "/referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-http/img-tag/insecure-protocol.keep-origin-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-http/img-tag/insecure-protocol.no-redirect.http.html",
|
||||
"url": "/referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-http/img-tag/insecure-protocol.no-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-http/img-tag/insecure-protocol.swap-origin-redirect.http.html",
|
||||
"url": "/referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-http/img-tag/insecure-protocol.swap-origin-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-https/iframe-tag/upgrade-protocol.keep-origin-redirect.http.html",
|
||||
"url": "/referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-https/iframe-tag/upgrade-protocol.keep-origin-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-https/iframe-tag/upgrade-protocol.no-redirect.http.html",
|
||||
"url": "/referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-https/iframe-tag/upgrade-protocol.no-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-https/iframe-tag/upgrade-protocol.swap-origin-redirect.http.html",
|
||||
"url": "/referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-https/iframe-tag/upgrade-protocol.swap-origin-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-https/img-tag/upgrade-protocol.keep-origin-redirect.http.html",
|
||||
"url": "/referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-https/img-tag/upgrade-protocol.keep-origin-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-https/img-tag/upgrade-protocol.no-redirect.http.html",
|
||||
"url": "/referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-https/img-tag/upgrade-protocol.no-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-https/img-tag/upgrade-protocol.swap-origin-redirect.http.html",
|
||||
"url": "/referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-https/img-tag/upgrade-protocol.swap-origin-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-http/iframe-tag/insecure-protocol.keep-origin-redirect.http.html",
|
||||
"url": "/referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-http/iframe-tag/insecure-protocol.keep-origin-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-http/iframe-tag/insecure-protocol.no-redirect.http.html",
|
||||
"url": "/referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-http/iframe-tag/insecure-protocol.no-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-http/iframe-tag/insecure-protocol.swap-origin-redirect.http.html",
|
||||
"url": "/referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-http/iframe-tag/insecure-protocol.swap-origin-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-http/img-tag/insecure-protocol.keep-origin-redirect.http.html",
|
||||
"url": "/referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-http/img-tag/insecure-protocol.keep-origin-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-http/img-tag/insecure-protocol.no-redirect.http.html",
|
||||
"url": "/referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-http/img-tag/insecure-protocol.no-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-http/img-tag/insecure-protocol.swap-origin-redirect.http.html",
|
||||
"url": "/referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-http/img-tag/insecure-protocol.swap-origin-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-https/iframe-tag/upgrade-protocol.keep-origin-redirect.http.html",
|
||||
"url": "/referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-https/iframe-tag/upgrade-protocol.keep-origin-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-https/iframe-tag/upgrade-protocol.no-redirect.http.html",
|
||||
"url": "/referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-https/iframe-tag/upgrade-protocol.no-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-https/iframe-tag/upgrade-protocol.swap-origin-redirect.http.html",
|
||||
"url": "/referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-https/iframe-tag/upgrade-protocol.swap-origin-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-https/img-tag/upgrade-protocol.keep-origin-redirect.http.html",
|
||||
"url": "/referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-https/img-tag/upgrade-protocol.keep-origin-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-https/img-tag/upgrade-protocol.no-redirect.http.html",
|
||||
"url": "/referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-https/img-tag/upgrade-protocol.no-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-https/img-tag/upgrade-protocol.swap-origin-redirect.http.html",
|
||||
"url": "/referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-https/img-tag/upgrade-protocol.swap-origin-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/no-referrer-when-downgrade/http-csp/cross-origin/http-http/fetch-request/insecure-protocol.keep-origin-redirect.http.html",
|
||||
"url": "/referrer-policy/no-referrer-when-downgrade/http-csp/cross-origin/http-http/fetch-request/insecure-protocol.keep-origin-redirect.http.html"
|
||||
|
@ -22843,6 +22995,102 @@
|
|||
"path": "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/xhr-request/upgrade-protocol.swap-origin-redirect.http.html",
|
||||
"url": "/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/xhr-request/upgrade-protocol.swap-origin-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/no-referrer/attr-referrer/cross-origin/http-http/iframe-tag/generic.keep-origin-redirect.http.html",
|
||||
"url": "/referrer-policy/no-referrer/attr-referrer/cross-origin/http-http/iframe-tag/generic.keep-origin-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/no-referrer/attr-referrer/cross-origin/http-http/iframe-tag/generic.no-redirect.http.html",
|
||||
"url": "/referrer-policy/no-referrer/attr-referrer/cross-origin/http-http/iframe-tag/generic.no-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/no-referrer/attr-referrer/cross-origin/http-http/iframe-tag/generic.swap-origin-redirect.http.html",
|
||||
"url": "/referrer-policy/no-referrer/attr-referrer/cross-origin/http-http/iframe-tag/generic.swap-origin-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/no-referrer/attr-referrer/cross-origin/http-http/img-tag/generic.keep-origin-redirect.http.html",
|
||||
"url": "/referrer-policy/no-referrer/attr-referrer/cross-origin/http-http/img-tag/generic.keep-origin-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/no-referrer/attr-referrer/cross-origin/http-http/img-tag/generic.no-redirect.http.html",
|
||||
"url": "/referrer-policy/no-referrer/attr-referrer/cross-origin/http-http/img-tag/generic.no-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/no-referrer/attr-referrer/cross-origin/http-http/img-tag/generic.swap-origin-redirect.http.html",
|
||||
"url": "/referrer-policy/no-referrer/attr-referrer/cross-origin/http-http/img-tag/generic.swap-origin-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/no-referrer/attr-referrer/cross-origin/http-https/iframe-tag/generic.keep-origin-redirect.http.html",
|
||||
"url": "/referrer-policy/no-referrer/attr-referrer/cross-origin/http-https/iframe-tag/generic.keep-origin-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/no-referrer/attr-referrer/cross-origin/http-https/iframe-tag/generic.no-redirect.http.html",
|
||||
"url": "/referrer-policy/no-referrer/attr-referrer/cross-origin/http-https/iframe-tag/generic.no-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/no-referrer/attr-referrer/cross-origin/http-https/iframe-tag/generic.swap-origin-redirect.http.html",
|
||||
"url": "/referrer-policy/no-referrer/attr-referrer/cross-origin/http-https/iframe-tag/generic.swap-origin-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/no-referrer/attr-referrer/cross-origin/http-https/img-tag/generic.keep-origin-redirect.http.html",
|
||||
"url": "/referrer-policy/no-referrer/attr-referrer/cross-origin/http-https/img-tag/generic.keep-origin-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/no-referrer/attr-referrer/cross-origin/http-https/img-tag/generic.no-redirect.http.html",
|
||||
"url": "/referrer-policy/no-referrer/attr-referrer/cross-origin/http-https/img-tag/generic.no-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/no-referrer/attr-referrer/cross-origin/http-https/img-tag/generic.swap-origin-redirect.http.html",
|
||||
"url": "/referrer-policy/no-referrer/attr-referrer/cross-origin/http-https/img-tag/generic.swap-origin-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/no-referrer/attr-referrer/same-origin/http-http/iframe-tag/generic.keep-origin-redirect.http.html",
|
||||
"url": "/referrer-policy/no-referrer/attr-referrer/same-origin/http-http/iframe-tag/generic.keep-origin-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/no-referrer/attr-referrer/same-origin/http-http/iframe-tag/generic.no-redirect.http.html",
|
||||
"url": "/referrer-policy/no-referrer/attr-referrer/same-origin/http-http/iframe-tag/generic.no-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/no-referrer/attr-referrer/same-origin/http-http/iframe-tag/generic.swap-origin-redirect.http.html",
|
||||
"url": "/referrer-policy/no-referrer/attr-referrer/same-origin/http-http/iframe-tag/generic.swap-origin-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/no-referrer/attr-referrer/same-origin/http-http/img-tag/generic.keep-origin-redirect.http.html",
|
||||
"url": "/referrer-policy/no-referrer/attr-referrer/same-origin/http-http/img-tag/generic.keep-origin-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/no-referrer/attr-referrer/same-origin/http-http/img-tag/generic.no-redirect.http.html",
|
||||
"url": "/referrer-policy/no-referrer/attr-referrer/same-origin/http-http/img-tag/generic.no-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/no-referrer/attr-referrer/same-origin/http-http/img-tag/generic.swap-origin-redirect.http.html",
|
||||
"url": "/referrer-policy/no-referrer/attr-referrer/same-origin/http-http/img-tag/generic.swap-origin-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/no-referrer/attr-referrer/same-origin/http-https/iframe-tag/generic.keep-origin-redirect.http.html",
|
||||
"url": "/referrer-policy/no-referrer/attr-referrer/same-origin/http-https/iframe-tag/generic.keep-origin-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/no-referrer/attr-referrer/same-origin/http-https/iframe-tag/generic.no-redirect.http.html",
|
||||
"url": "/referrer-policy/no-referrer/attr-referrer/same-origin/http-https/iframe-tag/generic.no-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/no-referrer/attr-referrer/same-origin/http-https/iframe-tag/generic.swap-origin-redirect.http.html",
|
||||
"url": "/referrer-policy/no-referrer/attr-referrer/same-origin/http-https/iframe-tag/generic.swap-origin-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/no-referrer/attr-referrer/same-origin/http-https/img-tag/generic.keep-origin-redirect.http.html",
|
||||
"url": "/referrer-policy/no-referrer/attr-referrer/same-origin/http-https/img-tag/generic.keep-origin-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/no-referrer/attr-referrer/same-origin/http-https/img-tag/generic.no-redirect.http.html",
|
||||
"url": "/referrer-policy/no-referrer/attr-referrer/same-origin/http-https/img-tag/generic.no-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/no-referrer/attr-referrer/same-origin/http-https/img-tag/generic.swap-origin-redirect.http.html",
|
||||
"url": "/referrer-policy/no-referrer/attr-referrer/same-origin/http-https/img-tag/generic.swap-origin-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/no-referrer/http-csp/cross-origin/http-http/fetch-request/generic.keep-origin-redirect.http.html",
|
||||
"url": "/referrer-policy/no-referrer/http-csp/cross-origin/http-http/fetch-request/generic.keep-origin-redirect.http.html"
|
||||
|
@ -23563,6 +23811,102 @@
|
|||
"path": "referrer-policy/no-referrer/meta-referrer/same-origin/http-https/xhr-request/generic.swap-origin-redirect.http.html",
|
||||
"url": "/referrer-policy/no-referrer/meta-referrer/same-origin/http-https/xhr-request/generic.swap-origin-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/origin-only/attr-referrer/cross-origin/http-http/iframe-tag/generic.keep-origin-redirect.http.html",
|
||||
"url": "/referrer-policy/origin-only/attr-referrer/cross-origin/http-http/iframe-tag/generic.keep-origin-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/origin-only/attr-referrer/cross-origin/http-http/iframe-tag/generic.no-redirect.http.html",
|
||||
"url": "/referrer-policy/origin-only/attr-referrer/cross-origin/http-http/iframe-tag/generic.no-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/origin-only/attr-referrer/cross-origin/http-http/iframe-tag/generic.swap-origin-redirect.http.html",
|
||||
"url": "/referrer-policy/origin-only/attr-referrer/cross-origin/http-http/iframe-tag/generic.swap-origin-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/origin-only/attr-referrer/cross-origin/http-http/img-tag/generic.keep-origin-redirect.http.html",
|
||||
"url": "/referrer-policy/origin-only/attr-referrer/cross-origin/http-http/img-tag/generic.keep-origin-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/origin-only/attr-referrer/cross-origin/http-http/img-tag/generic.no-redirect.http.html",
|
||||
"url": "/referrer-policy/origin-only/attr-referrer/cross-origin/http-http/img-tag/generic.no-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/origin-only/attr-referrer/cross-origin/http-http/img-tag/generic.swap-origin-redirect.http.html",
|
||||
"url": "/referrer-policy/origin-only/attr-referrer/cross-origin/http-http/img-tag/generic.swap-origin-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/origin-only/attr-referrer/cross-origin/http-https/iframe-tag/generic.keep-origin-redirect.http.html",
|
||||
"url": "/referrer-policy/origin-only/attr-referrer/cross-origin/http-https/iframe-tag/generic.keep-origin-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/origin-only/attr-referrer/cross-origin/http-https/iframe-tag/generic.no-redirect.http.html",
|
||||
"url": "/referrer-policy/origin-only/attr-referrer/cross-origin/http-https/iframe-tag/generic.no-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/origin-only/attr-referrer/cross-origin/http-https/iframe-tag/generic.swap-origin-redirect.http.html",
|
||||
"url": "/referrer-policy/origin-only/attr-referrer/cross-origin/http-https/iframe-tag/generic.swap-origin-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/origin-only/attr-referrer/cross-origin/http-https/img-tag/generic.keep-origin-redirect.http.html",
|
||||
"url": "/referrer-policy/origin-only/attr-referrer/cross-origin/http-https/img-tag/generic.keep-origin-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/origin-only/attr-referrer/cross-origin/http-https/img-tag/generic.no-redirect.http.html",
|
||||
"url": "/referrer-policy/origin-only/attr-referrer/cross-origin/http-https/img-tag/generic.no-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/origin-only/attr-referrer/cross-origin/http-https/img-tag/generic.swap-origin-redirect.http.html",
|
||||
"url": "/referrer-policy/origin-only/attr-referrer/cross-origin/http-https/img-tag/generic.swap-origin-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/origin-only/attr-referrer/same-origin/http-http/iframe-tag/generic.keep-origin-redirect.http.html",
|
||||
"url": "/referrer-policy/origin-only/attr-referrer/same-origin/http-http/iframe-tag/generic.keep-origin-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/origin-only/attr-referrer/same-origin/http-http/iframe-tag/generic.no-redirect.http.html",
|
||||
"url": "/referrer-policy/origin-only/attr-referrer/same-origin/http-http/iframe-tag/generic.no-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/origin-only/attr-referrer/same-origin/http-http/iframe-tag/generic.swap-origin-redirect.http.html",
|
||||
"url": "/referrer-policy/origin-only/attr-referrer/same-origin/http-http/iframe-tag/generic.swap-origin-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/origin-only/attr-referrer/same-origin/http-http/img-tag/generic.keep-origin-redirect.http.html",
|
||||
"url": "/referrer-policy/origin-only/attr-referrer/same-origin/http-http/img-tag/generic.keep-origin-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/origin-only/attr-referrer/same-origin/http-http/img-tag/generic.no-redirect.http.html",
|
||||
"url": "/referrer-policy/origin-only/attr-referrer/same-origin/http-http/img-tag/generic.no-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/origin-only/attr-referrer/same-origin/http-http/img-tag/generic.swap-origin-redirect.http.html",
|
||||
"url": "/referrer-policy/origin-only/attr-referrer/same-origin/http-http/img-tag/generic.swap-origin-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/origin-only/attr-referrer/same-origin/http-https/iframe-tag/generic.keep-origin-redirect.http.html",
|
||||
"url": "/referrer-policy/origin-only/attr-referrer/same-origin/http-https/iframe-tag/generic.keep-origin-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/origin-only/attr-referrer/same-origin/http-https/iframe-tag/generic.no-redirect.http.html",
|
||||
"url": "/referrer-policy/origin-only/attr-referrer/same-origin/http-https/iframe-tag/generic.no-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/origin-only/attr-referrer/same-origin/http-https/iframe-tag/generic.swap-origin-redirect.http.html",
|
||||
"url": "/referrer-policy/origin-only/attr-referrer/same-origin/http-https/iframe-tag/generic.swap-origin-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/origin-only/attr-referrer/same-origin/http-https/img-tag/generic.keep-origin-redirect.http.html",
|
||||
"url": "/referrer-policy/origin-only/attr-referrer/same-origin/http-https/img-tag/generic.keep-origin-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/origin-only/attr-referrer/same-origin/http-https/img-tag/generic.no-redirect.http.html",
|
||||
"url": "/referrer-policy/origin-only/attr-referrer/same-origin/http-https/img-tag/generic.no-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/origin-only/attr-referrer/same-origin/http-https/img-tag/generic.swap-origin-redirect.http.html",
|
||||
"url": "/referrer-policy/origin-only/attr-referrer/same-origin/http-https/img-tag/generic.swap-origin-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/origin-only/http-csp/cross-origin/http-http/fetch-request/generic.keep-origin-redirect.http.html",
|
||||
"url": "/referrer-policy/origin-only/http-csp/cross-origin/http-http/fetch-request/generic.keep-origin-redirect.http.html"
|
||||
|
@ -24283,6 +24627,134 @@
|
|||
"path": "referrer-policy/origin-only/meta-referrer/same-origin/http-https/xhr-request/generic.swap-origin-redirect.http.html",
|
||||
"url": "/referrer-policy/origin-only/meta-referrer/same-origin/http-https/xhr-request/generic.swap-origin-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-http/iframe-tag/cross-origin.keep-origin-redirect.http.html",
|
||||
"url": "/referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-http/iframe-tag/cross-origin.keep-origin-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-http/iframe-tag/cross-origin.no-redirect.http.html",
|
||||
"url": "/referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-http/iframe-tag/cross-origin.no-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-http/iframe-tag/cross-origin.swap-origin-redirect.http.html",
|
||||
"url": "/referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-http/iframe-tag/cross-origin.swap-origin-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-http/img-tag/cross-origin.keep-origin-redirect.http.html",
|
||||
"url": "/referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-http/img-tag/cross-origin.keep-origin-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-http/img-tag/cross-origin.no-redirect.http.html",
|
||||
"url": "/referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-http/img-tag/cross-origin.no-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-http/img-tag/cross-origin.swap-origin-redirect.http.html",
|
||||
"url": "/referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-http/img-tag/cross-origin.swap-origin-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-https/iframe-tag/cross-origin.keep-origin-redirect.http.html",
|
||||
"url": "/referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-https/iframe-tag/cross-origin.keep-origin-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-https/iframe-tag/cross-origin.no-redirect.http.html",
|
||||
"url": "/referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-https/iframe-tag/cross-origin.no-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-https/iframe-tag/cross-origin.swap-origin-redirect.http.html",
|
||||
"url": "/referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-https/iframe-tag/cross-origin.swap-origin-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-https/img-tag/cross-origin.keep-origin-redirect.http.html",
|
||||
"url": "/referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-https/img-tag/cross-origin.keep-origin-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-https/img-tag/cross-origin.no-redirect.http.html",
|
||||
"url": "/referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-https/img-tag/cross-origin.no-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-https/img-tag/cross-origin.swap-origin-redirect.http.html",
|
||||
"url": "/referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-https/img-tag/cross-origin.swap-origin-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-http/iframe-tag/same-origin-insecure.keep-origin-redirect.http.html",
|
||||
"url": "/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-http/iframe-tag/same-origin-insecure.keep-origin-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-http/iframe-tag/same-origin-insecure.no-redirect.http.html",
|
||||
"url": "/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-http/iframe-tag/same-origin-insecure.no-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-http/iframe-tag/same-origin-insecure.swap-origin-redirect.http.html",
|
||||
"url": "/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-http/iframe-tag/same-origin-insecure.swap-origin-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-http/img-tag/same-origin-insecure.keep-origin-redirect.http.html",
|
||||
"url": "/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-http/img-tag/same-origin-insecure.keep-origin-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-http/img-tag/same-origin-insecure.no-redirect.http.html",
|
||||
"url": "/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-http/img-tag/same-origin-insecure.no-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-http/img-tag/same-origin-insecure.swap-origin-redirect.http.html",
|
||||
"url": "/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-http/img-tag/same-origin-insecure.swap-origin-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/same-origin-downgrade.keep-origin-redirect.http.html",
|
||||
"url": "/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/same-origin-downgrade.keep-origin-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/same-origin-downgrade.no-redirect.http.html",
|
||||
"url": "/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/same-origin-downgrade.no-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/same-origin-downgrade.swap-origin-redirect.http.html",
|
||||
"url": "/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/same-origin-downgrade.swap-origin-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/same-origin-insecure.swap-origin-redirect.http.html",
|
||||
"url": "/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/same-origin-insecure.swap-origin-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/same-origin-upgrade.keep-origin-redirect.http.html",
|
||||
"url": "/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/same-origin-upgrade.keep-origin-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/same-origin-upgrade.no-redirect.http.html",
|
||||
"url": "/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/same-origin-upgrade.no-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/same-origin-upgrade.swap-origin-redirect.http.html",
|
||||
"url": "/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/same-origin-upgrade.swap-origin-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/same-origin-downgrade.keep-origin-redirect.http.html",
|
||||
"url": "/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/same-origin-downgrade.keep-origin-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/same-origin-downgrade.no-redirect.http.html",
|
||||
"url": "/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/same-origin-downgrade.no-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/same-origin-downgrade.swap-origin-redirect.http.html",
|
||||
"url": "/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/same-origin-downgrade.swap-origin-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/same-origin-insecure.swap-origin-redirect.http.html",
|
||||
"url": "/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/same-origin-insecure.swap-origin-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/same-origin-upgrade.keep-origin-redirect.http.html",
|
||||
"url": "/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/same-origin-upgrade.keep-origin-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/same-origin-upgrade.no-redirect.http.html",
|
||||
"url": "/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/same-origin-upgrade.no-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/same-origin-upgrade.swap-origin-redirect.http.html",
|
||||
"url": "/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/same-origin-upgrade.swap-origin-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/origin-when-cross-origin/http-csp/cross-origin/http-http/fetch-request/cross-origin.keep-origin-redirect.http.html",
|
||||
"url": "/referrer-policy/origin-when-cross-origin/http-csp/cross-origin/http-http/fetch-request/cross-origin.keep-origin-redirect.http.html"
|
||||
|
@ -25243,6 +25715,102 @@
|
|||
"path": "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/same-origin-upgrade.swap-origin-redirect.http.html",
|
||||
"url": "/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/same-origin-upgrade.swap-origin-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/iframe-tag/generic.keep-origin-redirect.http.html",
|
||||
"url": "/referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/iframe-tag/generic.keep-origin-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/iframe-tag/generic.no-redirect.http.html",
|
||||
"url": "/referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/iframe-tag/generic.no-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/iframe-tag/generic.swap-origin-redirect.http.html",
|
||||
"url": "/referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/iframe-tag/generic.swap-origin-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/img-tag/generic.keep-origin-redirect.http.html",
|
||||
"url": "/referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/img-tag/generic.keep-origin-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/img-tag/generic.no-redirect.http.html",
|
||||
"url": "/referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/img-tag/generic.no-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/img-tag/generic.swap-origin-redirect.http.html",
|
||||
"url": "/referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/img-tag/generic.swap-origin-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/iframe-tag/generic.keep-origin-redirect.http.html",
|
||||
"url": "/referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/iframe-tag/generic.keep-origin-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/iframe-tag/generic.no-redirect.http.html",
|
||||
"url": "/referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/iframe-tag/generic.no-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/iframe-tag/generic.swap-origin-redirect.http.html",
|
||||
"url": "/referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/iframe-tag/generic.swap-origin-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/img-tag/generic.keep-origin-redirect.http.html",
|
||||
"url": "/referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/img-tag/generic.keep-origin-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/img-tag/generic.no-redirect.http.html",
|
||||
"url": "/referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/img-tag/generic.no-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/img-tag/generic.swap-origin-redirect.http.html",
|
||||
"url": "/referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/img-tag/generic.swap-origin-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/iframe-tag/generic.keep-origin-redirect.http.html",
|
||||
"url": "/referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/iframe-tag/generic.keep-origin-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/iframe-tag/generic.no-redirect.http.html",
|
||||
"url": "/referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/iframe-tag/generic.no-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/iframe-tag/generic.swap-origin-redirect.http.html",
|
||||
"url": "/referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/iframe-tag/generic.swap-origin-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/img-tag/generic.keep-origin-redirect.http.html",
|
||||
"url": "/referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/img-tag/generic.keep-origin-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/img-tag/generic.no-redirect.http.html",
|
||||
"url": "/referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/img-tag/generic.no-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/img-tag/generic.swap-origin-redirect.http.html",
|
||||
"url": "/referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/img-tag/generic.swap-origin-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/iframe-tag/generic.keep-origin-redirect.http.html",
|
||||
"url": "/referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/iframe-tag/generic.keep-origin-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/iframe-tag/generic.no-redirect.http.html",
|
||||
"url": "/referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/iframe-tag/generic.no-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/iframe-tag/generic.swap-origin-redirect.http.html",
|
||||
"url": "/referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/iframe-tag/generic.swap-origin-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/img-tag/generic.keep-origin-redirect.http.html",
|
||||
"url": "/referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/img-tag/generic.keep-origin-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/img-tag/generic.no-redirect.http.html",
|
||||
"url": "/referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/img-tag/generic.no-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/img-tag/generic.swap-origin-redirect.http.html",
|
||||
"url": "/referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/img-tag/generic.swap-origin-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/unsafe-url/http-csp/cross-origin/http-http/fetch-request/generic.keep-origin-redirect.http.html",
|
||||
"url": "/referrer-policy/unsafe-url/http-csp/cross-origin/http-http/fetch-request/generic.keep-origin-redirect.http.html"
|
||||
|
@ -25963,6 +26531,102 @@
|
|||
"path": "referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/xhr-request/generic.swap-origin-redirect.http.html",
|
||||
"url": "/referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/xhr-request/generic.swap-origin-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-http/iframe-tag/generic.keep-origin-redirect.http.html",
|
||||
"url": "/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-http/iframe-tag/generic.keep-origin-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-http/iframe-tag/generic.no-redirect.http.html",
|
||||
"url": "/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-http/iframe-tag/generic.no-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-http/iframe-tag/generic.swap-origin-redirect.http.html",
|
||||
"url": "/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-http/iframe-tag/generic.swap-origin-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-http/img-tag/generic.keep-origin-redirect.http.html",
|
||||
"url": "/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-http/img-tag/generic.keep-origin-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-http/img-tag/generic.no-redirect.http.html",
|
||||
"url": "/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-http/img-tag/generic.no-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-http/img-tag/generic.swap-origin-redirect.http.html",
|
||||
"url": "/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-http/img-tag/generic.swap-origin-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-https/iframe-tag/generic.keep-origin-redirect.http.html",
|
||||
"url": "/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-https/iframe-tag/generic.keep-origin-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-https/iframe-tag/generic.no-redirect.http.html",
|
||||
"url": "/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-https/iframe-tag/generic.no-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-https/iframe-tag/generic.swap-origin-redirect.http.html",
|
||||
"url": "/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-https/iframe-tag/generic.swap-origin-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-https/img-tag/generic.keep-origin-redirect.http.html",
|
||||
"url": "/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-https/img-tag/generic.keep-origin-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-https/img-tag/generic.no-redirect.http.html",
|
||||
"url": "/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-https/img-tag/generic.no-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-https/img-tag/generic.swap-origin-redirect.http.html",
|
||||
"url": "/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-https/img-tag/generic.swap-origin-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-http/iframe-tag/generic.keep-origin-redirect.http.html",
|
||||
"url": "/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-http/iframe-tag/generic.keep-origin-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-http/iframe-tag/generic.no-redirect.http.html",
|
||||
"url": "/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-http/iframe-tag/generic.no-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-http/iframe-tag/generic.swap-origin-redirect.http.html",
|
||||
"url": "/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-http/iframe-tag/generic.swap-origin-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-http/img-tag/generic.keep-origin-redirect.http.html",
|
||||
"url": "/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-http/img-tag/generic.keep-origin-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-http/img-tag/generic.no-redirect.http.html",
|
||||
"url": "/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-http/img-tag/generic.no-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-http/img-tag/generic.swap-origin-redirect.http.html",
|
||||
"url": "/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-http/img-tag/generic.swap-origin-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-https/iframe-tag/generic.keep-origin-redirect.http.html",
|
||||
"url": "/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-https/iframe-tag/generic.keep-origin-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-https/iframe-tag/generic.no-redirect.http.html",
|
||||
"url": "/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-https/iframe-tag/generic.no-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-https/iframe-tag/generic.swap-origin-redirect.http.html",
|
||||
"url": "/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-https/iframe-tag/generic.swap-origin-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-https/img-tag/generic.keep-origin-redirect.http.html",
|
||||
"url": "/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-https/img-tag/generic.keep-origin-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-https/img-tag/generic.no-redirect.http.html",
|
||||
"url": "/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-https/img-tag/generic.no-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-https/img-tag/generic.swap-origin-redirect.http.html",
|
||||
"url": "/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-https/img-tag/generic.swap-origin-redirect.http.html"
|
||||
},
|
||||
{
|
||||
"path": "referrer-policy/unset-referrer-policy/http-csp/cross-origin/http-http/fetch-request/generic.keep-origin-redirect.http.html",
|
||||
"url": "/referrer-policy/unset-referrer-policy/http-csp/cross-origin/http-http/fetch-request/generic.keep-origin-redirect.http.html"
|
||||
|
@ -26948,40 +27612,40 @@
|
|||
"url": "/shadow-dom/untriaged/events/event-retargeting/test-004.html"
|
||||
},
|
||||
{
|
||||
"path": "shadow-dom/untriaged/events/events-that-are-always-stopped/test-001.html",
|
||||
"url": "/shadow-dom/untriaged/events/events-that-are-always-stopped/test-001.html"
|
||||
"path": "shadow-dom/untriaged/events/events-created-by-users-do-not-stop/test-001.html",
|
||||
"url": "/shadow-dom/untriaged/events/events-created-by-users-do-not-stop/test-001.html"
|
||||
},
|
||||
{
|
||||
"path": "shadow-dom/untriaged/events/events-that-are-always-stopped/test-002.html",
|
||||
"url": "/shadow-dom/untriaged/events/events-that-are-always-stopped/test-002.html"
|
||||
"path": "shadow-dom/untriaged/events/events-created-by-users-do-not-stop/test-002.html",
|
||||
"url": "/shadow-dom/untriaged/events/events-created-by-users-do-not-stop/test-002.html"
|
||||
},
|
||||
{
|
||||
"path": "shadow-dom/untriaged/events/events-that-are-always-stopped/test-003.html",
|
||||
"url": "/shadow-dom/untriaged/events/events-that-are-always-stopped/test-003.html"
|
||||
"path": "shadow-dom/untriaged/events/events-created-by-users-do-not-stop/test-003.html",
|
||||
"url": "/shadow-dom/untriaged/events/events-created-by-users-do-not-stop/test-003.html"
|
||||
},
|
||||
{
|
||||
"path": "shadow-dom/untriaged/events/events-that-are-always-stopped/test-004.html",
|
||||
"url": "/shadow-dom/untriaged/events/events-that-are-always-stopped/test-004.html"
|
||||
"path": "shadow-dom/untriaged/events/events-created-by-users-do-not-stop/test-004.html",
|
||||
"url": "/shadow-dom/untriaged/events/events-created-by-users-do-not-stop/test-004.html"
|
||||
},
|
||||
{
|
||||
"path": "shadow-dom/untriaged/events/events-that-are-always-stopped/test-005.html",
|
||||
"url": "/shadow-dom/untriaged/events/events-that-are-always-stopped/test-005.html"
|
||||
"path": "shadow-dom/untriaged/events/events-created-by-users-do-not-stop/test-005.html",
|
||||
"url": "/shadow-dom/untriaged/events/events-created-by-users-do-not-stop/test-005.html"
|
||||
},
|
||||
{
|
||||
"path": "shadow-dom/untriaged/events/events-that-are-always-stopped/test-006.html",
|
||||
"url": "/shadow-dom/untriaged/events/events-that-are-always-stopped/test-006.html"
|
||||
"path": "shadow-dom/untriaged/events/events-created-by-users-do-not-stop/test-006.html",
|
||||
"url": "/shadow-dom/untriaged/events/events-created-by-users-do-not-stop/test-006.html"
|
||||
},
|
||||
{
|
||||
"path": "shadow-dom/untriaged/events/events-that-are-always-stopped/test-007.html",
|
||||
"url": "/shadow-dom/untriaged/events/events-that-are-always-stopped/test-007.html"
|
||||
"path": "shadow-dom/untriaged/events/events-created-by-users-do-not-stop/test-007.html",
|
||||
"url": "/shadow-dom/untriaged/events/events-created-by-users-do-not-stop/test-007.html"
|
||||
},
|
||||
{
|
||||
"path": "shadow-dom/untriaged/events/events-that-are-always-stopped/test-008.html",
|
||||
"url": "/shadow-dom/untriaged/events/events-that-are-always-stopped/test-008.html"
|
||||
"path": "shadow-dom/untriaged/events/events-created-by-users-do-not-stop/test-008.html",
|
||||
"url": "/shadow-dom/untriaged/events/events-created-by-users-do-not-stop/test-008.html"
|
||||
},
|
||||
{
|
||||
"path": "shadow-dom/untriaged/events/events-that-are-always-stopped/test-009.html",
|
||||
"url": "/shadow-dom/untriaged/events/events-that-are-always-stopped/test-009.html"
|
||||
"path": "shadow-dom/untriaged/events/events-created-by-users-do-not-stop/test-009.html",
|
||||
"url": "/shadow-dom/untriaged/events/events-created-by-users-do-not-stop/test-009.html"
|
||||
},
|
||||
{
|
||||
"path": "shadow-dom/untriaged/events/retargeting-focus-events/test-001.html",
|
||||
|
@ -27503,6 +28167,10 @@
|
|||
"path": "web-animations/keyframe-effect/constructor.html",
|
||||
"url": "/web-animations/keyframe-effect/constructor.html"
|
||||
},
|
||||
{
|
||||
"path": "web-animations/keyframe-effect/effect-easing.html",
|
||||
"url": "/web-animations/keyframe-effect/effect-easing.html"
|
||||
},
|
||||
{
|
||||
"path": "web-animations/keyframe-effect/getComputedTiming.html",
|
||||
"url": "/web-animations/keyframe-effect/getComputedTiming.html"
|
||||
|
@ -32581,6 +33249,26 @@
|
|||
"timeout": "long",
|
||||
"url": "/html/browsers/browsing-the-web/scroll-to-fragid/007.html"
|
||||
},
|
||||
{
|
||||
"path": "html/browsers/browsing-the-web/scroll-to-fragid/scroll-frag-percent-encoded.html",
|
||||
"timeout": "long",
|
||||
"url": "/html/browsers/browsing-the-web/scroll-to-fragid/scroll-frag-percent-encoded.html"
|
||||
},
|
||||
{
|
||||
"path": "html/browsers/browsing-the-web/scroll-to-fragid/scroll-to-anchor-name.html",
|
||||
"timeout": "long",
|
||||
"url": "/html/browsers/browsing-the-web/scroll-to-fragid/scroll-to-anchor-name.html"
|
||||
},
|
||||
{
|
||||
"path": "html/browsers/browsing-the-web/scroll-to-fragid/scroll-to-id-top.html",
|
||||
"timeout": "long",
|
||||
"url": "/html/browsers/browsing-the-web/scroll-to-fragid/scroll-to-id-top.html"
|
||||
},
|
||||
{
|
||||
"path": "html/browsers/browsing-the-web/scroll-to-fragid/scroll-to-top.html",
|
||||
"timeout": "long",
|
||||
"url": "/html/browsers/browsing-the-web/scroll-to-fragid/scroll-to-top.html"
|
||||
},
|
||||
{
|
||||
"path": "html/browsers/history/the-history-interface/007.html",
|
||||
"timeout": "long",
|
||||
|
@ -33806,50 +34494,7 @@
|
|||
},
|
||||
"local_changes": {
|
||||
"deleted": [],
|
||||
"items": {
|
||||
"testharness": {
|
||||
"WebIDL/ecmascript-binding/has-instance.html": [
|
||||
{
|
||||
"path": "WebIDL/ecmascript-binding/has-instance.html",
|
||||
"url": "/WebIDL/ecmascript-binding/has-instance.html"
|
||||
}
|
||||
],
|
||||
"XMLHttpRequest/responsexml-get-twice.htm": [
|
||||
{
|
||||
"path": "XMLHttpRequest/responsexml-get-twice.htm",
|
||||
"url": "/XMLHttpRequest/responsexml-get-twice.htm"
|
||||
}
|
||||
],
|
||||
"html/browsers/browsing-the-web/scroll-to-fragid/scroll-frag-percent-encoded.html": [
|
||||
{
|
||||
"path": "html/browsers/browsing-the-web/scroll-to-fragid/scroll-frag-percent-encoded.html",
|
||||
"timeout": "long",
|
||||
"url": "/html/browsers/browsing-the-web/scroll-to-fragid/scroll-frag-percent-encoded.html"
|
||||
}
|
||||
],
|
||||
"html/browsers/browsing-the-web/scroll-to-fragid/scroll-to-anchor-name.html": [
|
||||
{
|
||||
"path": "html/browsers/browsing-the-web/scroll-to-fragid/scroll-to-anchor-name.html",
|
||||
"timeout": "long",
|
||||
"url": "/html/browsers/browsing-the-web/scroll-to-fragid/scroll-to-anchor-name.html"
|
||||
}
|
||||
],
|
||||
"html/browsers/browsing-the-web/scroll-to-fragid/scroll-to-id-top.html": [
|
||||
{
|
||||
"path": "html/browsers/browsing-the-web/scroll-to-fragid/scroll-to-id-top.html",
|
||||
"timeout": "long",
|
||||
"url": "/html/browsers/browsing-the-web/scroll-to-fragid/scroll-to-id-top.html"
|
||||
}
|
||||
],
|
||||
"html/browsers/browsing-the-web/scroll-to-fragid/scroll-to-top.html": [
|
||||
{
|
||||
"path": "html/browsers/browsing-the-web/scroll-to-fragid/scroll-to-top.html",
|
||||
"timeout": "long",
|
||||
"url": "/html/browsers/browsing-the-web/scroll-to-fragid/scroll-to-top.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"items": {},
|
||||
"reftest_nodes": {}
|
||||
},
|
||||
"reftest_nodes": {
|
||||
|
@ -39962,7 +40607,7 @@
|
|||
}
|
||||
]
|
||||
},
|
||||
"rev": "95aad3bd9b82b5c65d84d53517b65ba084de9394",
|
||||
"rev": "7ed49cff4d031720f829c01df837ed7a09ad5c60",
|
||||
"url_base": "/",
|
||||
"version": 2
|
||||
}
|
||||
|
|
|
@ -2,3 +2,4 @@
|
|||
type: testharness
|
||||
[Timeout test: timeout hit before load, timeout scheduled at 2000]
|
||||
expected: FAIL
|
||||
|
||||
|
|
|
@ -131,3 +131,4 @@
|
|||
|
||||
[remote (null) to local (*), expect to fail]
|
||||
expected: FAIL
|
||||
|
||||
|
|
|
@ -1,5 +1,5 @@
|
|||
[scroll-frag-percent-encoded.html]
|
||||
type: testharness
|
||||
|
||||
[Fragment Navigation: fragment id should be percent-decoded]
|
||||
expected: FAIL
|
||||
|
||||
|
|
|
@ -1,5 +1,5 @@
|
|||
[scroll-to-anchor-name.html]
|
||||
type: testharness
|
||||
|
||||
[Fragment Navigation: scroll to anchor name is lower priority than equal id]
|
||||
expected: FAIL
|
||||
|
||||
|
|
|
@ -1,5 +1,5 @@
|
|||
[scroll-to-id-top.html]
|
||||
type: testharness
|
||||
|
||||
[Fragment Navigation: TOP is a valid element id, which overrides navigating to top of the document]
|
||||
expected: FAIL
|
||||
|
||||
|
|
|
@ -1,5 +1,5 @@
|
|||
[scroll-to-top.html]
|
||||
type: testharness
|
||||
|
||||
[Fragment Navigation: When fragid is TOP scroll to the top of the document]
|
||||
expected: FAIL
|
||||
|
||||
|
|
|
@ -12,3 +12,6 @@
|
|||
[Dynamic name]
|
||||
expected: FAIL
|
||||
|
||||
[duplicate property names]
|
||||
expected: FAIL
|
||||
|
||||
|
|
|
@ -8889,9 +8889,6 @@
|
|||
[HTMLAreaElement interface: document.createElement("area") must inherit property "hash" with the proper type (19)]
|
||||
expected: FAIL
|
||||
|
||||
[Location interface: window.location must have own property "origin"]
|
||||
expected: FAIL
|
||||
|
||||
[Location interface: calling replace(USVString) on window.location with too few arguments must throw TypeError]
|
||||
expected: FAIL
|
||||
|
||||
|
@ -9090,3 +9087,15 @@
|
|||
[History interface: window.history must inherit property "replaceState" with the proper type (7)]
|
||||
expected: FAIL
|
||||
|
||||
[HTMLAllCollection interface: attribute length]
|
||||
expected: FAIL
|
||||
|
||||
[HTMLAllCollection interface: document.all must inherit property "length" with the proper type (0)]
|
||||
expected: FAIL
|
||||
|
||||
[HTMLAllCollection interface: document.all must inherit property "item" with the proper type (2)]
|
||||
expected: FAIL
|
||||
|
||||
[HTMLAllCollection interface: document.all must inherit property "namedItem" with the proper type (3)]
|
||||
expected: FAIL
|
||||
|
||||
|
|
|
@ -846,9 +846,6 @@
|
|||
[img.crossOrigin: IDL set to "\\0" followed by IDL get]
|
||||
expected: FAIL
|
||||
|
||||
[img.crossOrigin: IDL set to null followed by IDL get]
|
||||
expected: FAIL
|
||||
|
||||
[img.crossOrigin: IDL set to object "test-toString" followed by getAttribute()]
|
||||
expected: FAIL
|
||||
|
||||
|
@ -10101,9 +10098,6 @@
|
|||
[video.crossOrigin: IDL set to "\\0" followed by IDL get]
|
||||
expected: FAIL
|
||||
|
||||
[video.crossOrigin: IDL set to null followed by IDL get]
|
||||
expected: FAIL
|
||||
|
||||
[video.crossOrigin: IDL set to object "test-toString" followed by getAttribute()]
|
||||
expected: FAIL
|
||||
|
||||
|
@ -12423,9 +12417,6 @@
|
|||
[audio.crossOrigin: IDL set to "\\0" followed by IDL get]
|
||||
expected: FAIL
|
||||
|
||||
[audio.crossOrigin: IDL set to null followed by IDL get]
|
||||
expected: FAIL
|
||||
|
||||
[audio.crossOrigin: IDL set to object "test-toString" followed by getAttribute()]
|
||||
expected: FAIL
|
||||
|
||||
|
@ -22113,3 +22104,15 @@
|
|||
[video.height: IDL set to 4294967295 followed by IDL get]
|
||||
expected: FAIL
|
||||
|
||||
[img.crossOrigin: IDL set to "" followed by IDL get]
|
||||
expected: FAIL
|
||||
|
||||
[img.crossOrigin: IDL set to null followed by getAttribute()]
|
||||
expected: FAIL
|
||||
|
||||
[video.crossOrigin: IDL set to null followed by getAttribute()]
|
||||
expected: FAIL
|
||||
|
||||
[audio.crossOrigin: IDL set to null followed by getAttribute()]
|
||||
expected: FAIL
|
||||
|
||||
|
|
|
@ -1947,9 +1947,6 @@
|
|||
[script.crossOrigin: IDL set to "\\0" followed by IDL get]
|
||||
expected: FAIL
|
||||
|
||||
[script.crossOrigin: IDL set to null followed by IDL get]
|
||||
expected: FAIL
|
||||
|
||||
[script.crossOrigin: IDL set to object "test-toString" followed by getAttribute()]
|
||||
expected: FAIL
|
||||
|
||||
|
@ -12999,3 +12996,6 @@
|
|||
[dialog.itemId: IDL set to object "test-valueOf" followed by IDL get]
|
||||
expected: FAIL
|
||||
|
||||
[script.crossOrigin: IDL set to null followed by getAttribute()]
|
||||
expected: FAIL
|
||||
|
||||
|
|
|
@ -0,0 +1,6 @@
|
|||
[update-media.html]
|
||||
type: testharness
|
||||
expected: TIMEOUT
|
||||
[set media after src updates selected image]
|
||||
expected: TIMEOUT
|
||||
|
|
@ -903,3 +903,66 @@
|
|||
[change state from button to color]
|
||||
expected: FAIL
|
||||
|
||||
[change state from hidden to file]
|
||||
expected: FAIL
|
||||
|
||||
[change state from text to file]
|
||||
expected: FAIL
|
||||
|
||||
[change state from search to file]
|
||||
expected: FAIL
|
||||
|
||||
[change state from tel to file]
|
||||
expected: FAIL
|
||||
|
||||
[change state from url to file]
|
||||
expected: FAIL
|
||||
|
||||
[change state from email to file]
|
||||
expected: FAIL
|
||||
|
||||
[change state from password to file]
|
||||
expected: FAIL
|
||||
|
||||
[change state from datetime to file]
|
||||
expected: FAIL
|
||||
|
||||
[change state from date to file]
|
||||
expected: FAIL
|
||||
|
||||
[change state from month to file]
|
||||
expected: FAIL
|
||||
|
||||
[change state from week to file]
|
||||
expected: FAIL
|
||||
|
||||
[change state from time to file]
|
||||
expected: FAIL
|
||||
|
||||
[change state from number to file]
|
||||
expected: FAIL
|
||||
|
||||
[change state from range to file]
|
||||
expected: FAIL
|
||||
|
||||
[change state from color to file]
|
||||
expected: FAIL
|
||||
|
||||
[change state from checkbox to file]
|
||||
expected: FAIL
|
||||
|
||||
[change state from radio to file]
|
||||
expected: FAIL
|
||||
|
||||
[change state from submit to file]
|
||||
expected: FAIL
|
||||
|
||||
[change state from image to file]
|
||||
expected: FAIL
|
||||
|
||||
[change state from reset to file]
|
||||
expected: FAIL
|
||||
|
||||
[change state from button to file]
|
||||
expected: FAIL
|
||||
|
||||
|
|
|
@ -0,0 +1,5 @@
|
|||
[indeterminate-radio.html]
|
||||
type: testharness
|
||||
[:indeterminate and input type=radio]
|
||||
expected: FAIL
|
||||
|
|
@ -1 +1 @@
|
|||
5942e9e3cb2fb588eb82198fd5548a42303a559f
|
||||
33f0040496bde88683cfadb4068183f7d08a5f1c
|
|
@ -2,7 +2,6 @@
|
|||
<title>IDBFactory.open() - errors in version argument</title>
|
||||
<script src=/resources/testharness.js></script>
|
||||
<script src=/resources/testharnessreport.js></script>
|
||||
<script src=support.js></script>
|
||||
|
||||
<script>
|
||||
function should_throw(val, name) {
|
||||
|
@ -26,7 +25,6 @@ should_throw(NaN)
|
|||
should_throw(Infinity)
|
||||
should_throw(-Infinity)
|
||||
should_throw("foo")
|
||||
should_throw(undefined)
|
||||
should_throw(null)
|
||||
should_throw(false)
|
||||
|
||||
|
@ -46,17 +44,27 @@ should_throw({
|
|||
|
||||
/* Valid */
|
||||
|
||||
function should_work(val) {
|
||||
function should_work(val, expected_version) {
|
||||
var name = format_value(val);
|
||||
var t = async_test("Calling open() with version argument " + name + " should not throw.")
|
||||
var rq = createdb(t, val)
|
||||
rq.onupgradeneeded = function() {
|
||||
t.done()
|
||||
}
|
||||
var dbname = 'test-db-does-not-exist';
|
||||
async_test(function(t) {
|
||||
window.indexedDB.deleteDatabase(dbname);
|
||||
var rq = window.indexedDB.open(dbname, val);
|
||||
rq.onupgradeneeded = t.step_func(function() {
|
||||
var db = rq.result;
|
||||
assert_equals(db.version, expected_version, 'version');
|
||||
rq.transaction.abort();
|
||||
});
|
||||
rq.onsuccess = t.unreached_func("open should fail");
|
||||
rq.onerror = t.step_func(function() {
|
||||
t.done()
|
||||
});
|
||||
}, "Calling open() with version argument " + name + " should not throw.")
|
||||
}
|
||||
|
||||
should_work(1.5)
|
||||
should_work(Number.MAX_SAFE_INTEGER) // 0x20000000000000 - 1
|
||||
should_work(1.5, 1)
|
||||
should_work(Number.MAX_SAFE_INTEGER, Number.MAX_SAFE_INTEGER) // 0x20000000000000 - 1
|
||||
should_work(undefined, 1)
|
||||
|
||||
</script>
|
||||
|
||||
|
|
|
@ -17,15 +17,9 @@
|
|||
db = event.target.result;
|
||||
ostore = db.createObjectStore("store", {keyPath:"pKey"});
|
||||
db.deleteObjectStore("store");
|
||||
}
|
||||
|
||||
open_rq.onsuccess = function (event) {
|
||||
t.step(function(){
|
||||
assert_throws("InvalidStateError", function(){
|
||||
ostore.add({ pKey: "primaryKey_0"});
|
||||
});
|
||||
assert_throws("InvalidStateError", function(){
|
||||
ostore.add({ pKey: "primaryKey_0"});
|
||||
});
|
||||
t.done();
|
||||
}
|
||||
</script>
|
||||
|
||||
|
|
|
@ -17,15 +17,9 @@
|
|||
db = event.target.result;
|
||||
ostore = db.createObjectStore("store", {keyPath:"pKey"});
|
||||
db.deleteObjectStore("store");
|
||||
}
|
||||
|
||||
open_rq.onsuccess = function (event) {
|
||||
t.step(function(){
|
||||
assert_throws("InvalidStateError", function(){
|
||||
ostore.clear();
|
||||
});
|
||||
assert_throws("InvalidStateError", function(){
|
||||
ostore.clear();
|
||||
});
|
||||
t.done();
|
||||
}
|
||||
</script>
|
||||
|
||||
|
|
|
@ -17,15 +17,9 @@
|
|||
db = event.target.result;
|
||||
ostore = db.createObjectStore("store", {keyPath:"pKey"});
|
||||
db.deleteObjectStore("store");
|
||||
}
|
||||
|
||||
open_rq.onsuccess = function (event) {
|
||||
t.step(function(){
|
||||
assert_throws("InvalidStateError", function(){
|
||||
ostore.count();
|
||||
});
|
||||
assert_throws("InvalidStateError", function(){
|
||||
ostore.count();
|
||||
});
|
||||
t.done();
|
||||
}
|
||||
</script>
|
||||
|
||||
|
|
|
@ -19,15 +19,9 @@
|
|||
db = event.target.result;
|
||||
ostore = db.createObjectStore("store", {keyPath:"pKey"});
|
||||
db.deleteObjectStore("store");
|
||||
}
|
||||
|
||||
open_rq.onsuccess = function (event) {
|
||||
t.step(function(){
|
||||
assert_throws("InvalidStateError", function(){
|
||||
ostore.delete("primaryKey_0");
|
||||
});
|
||||
assert_throws("InvalidStateError", function(){
|
||||
ostore.delete("primaryKey_0");
|
||||
});
|
||||
t.done();
|
||||
}
|
||||
</script>
|
||||
|
||||
|
|
|
@ -17,15 +17,9 @@
|
|||
db = event.target.result;
|
||||
ostore = db.createObjectStore("store", {keyPath:"pKey"});
|
||||
db.deleteObjectStore("store");
|
||||
}
|
||||
|
||||
open_rq.onsuccess = function (event) {
|
||||
t.step(function(){
|
||||
assert_throws("InvalidStateError", function(){
|
||||
ostore.put({pKey: "primaryKey_0"});
|
||||
});
|
||||
assert_throws("InvalidStateError", function(){
|
||||
ostore.put({pKey: "primaryKey_0"});
|
||||
});
|
||||
t.done();
|
||||
}
|
||||
</script>
|
||||
|
||||
|
|
|
@ -33,7 +33,7 @@
|
|||
return fd;
|
||||
}
|
||||
|
||||
do_test("formdata with blob", create_formdata(['key', new Blob(['value'], {type: 'text/x-value'})]), 'key=value,\n');
|
||||
do_test("formdata with blob", create_formdata(['key', new Blob(['value'], {type: 'text/x-value'})]), '\nkey=blob:text/x-value:5,');
|
||||
do_test("formdata with named blob", create_formdata(['key', new Blob(['value'], {type: 'text/x-value'}), 'blob.txt']), '\nkey=blob.txt:text/x-value:5,');
|
||||
// If 3rd argument is given and 2nd is not a Blob, formdata.append() should throw
|
||||
var test = async_test('formdata.append() should throw if value is string and file name is given'); // needs to be async just because the others above are
|
||||
|
|
15
tests/wpt/web-platform-tests/cookies/resources/echo-json.py
Normal file
15
tests/wpt/web-platform-tests/cookies/resources/echo-json.py
Normal file
|
@ -0,0 +1,15 @@
|
|||
import json
|
||||
|
||||
def main(request, response):
|
||||
headers = [("Content-Type", "application/json"),
|
||||
("Access-Control-Allow-Credentials", "true")]
|
||||
|
||||
if "origin" in request.headers:
|
||||
headers.append(("Access-Control-Allow-Origin", request.headers["origin"]))
|
||||
|
||||
values = []
|
||||
for key in request.cookies:
|
||||
for value in request.cookies.get_list(key):
|
||||
values.append("\"%s\": \"%s\"" % (key, value))
|
||||
body = "{ %s }" % ",".join(values)
|
||||
return headers, body
|
|
@ -0,0 +1,49 @@
|
|||
// Given an array of potentially asynchronous tests, this function will execute
|
||||
// each in serial, ensuring that one and only one test is executing at a time.
|
||||
//
|
||||
// The test array should look like this:
|
||||
//
|
||||
//
|
||||
// var tests = [
|
||||
// [
|
||||
// "Test description goes here.",
|
||||
// function () {
|
||||
// // Test code goes here. `this` is bound to the test object.
|
||||
// }
|
||||
// ],
|
||||
// ...
|
||||
// ];
|
||||
//
|
||||
// The |setup| and |teardown| arguments are functions which are executed before
|
||||
// and after each test, respectively.
|
||||
function executeTestsSerially(testList, setup, teardown) {
|
||||
var tests = testList.map(function (t) {
|
||||
return {
|
||||
test: async_test(t[0]),
|
||||
code: t[1]
|
||||
};
|
||||
});
|
||||
|
||||
var executeNextTest = function () {
|
||||
var current = tests.shift();
|
||||
if (current === undefined) {
|
||||
return;
|
||||
}
|
||||
|
||||
// Setup the test fixtures.
|
||||
if (setup) {
|
||||
setup();
|
||||
}
|
||||
|
||||
// Bind a callback to tear down the test fixtures.
|
||||
if (teardown) {
|
||||
current.test.add_cleanup(teardown);
|
||||
}
|
||||
|
||||
// Execute the test.
|
||||
current.test.step(current.code);
|
||||
};
|
||||
|
||||
add_result_callback(function () { setTimeout(executeNextTest, 0) });
|
||||
executeNextTest();
|
||||
}
|
|
@ -0,0 +1,47 @@
|
|||
<!doctype html>
|
||||
<html>
|
||||
<head>
|
||||
<meta charset=utf-8>
|
||||
<title>Set 'secure' cookie from `document.cookie` on a secure page</title>
|
||||
<meta name=help href="https://tools.ietf.org/html/draft-west-leave-secure-cookies-alone">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<script src="/cookies/resources/testharness-helpers.js"></script>
|
||||
</head>
|
||||
<body>
|
||||
<div id=log></div>
|
||||
<script>
|
||||
var tests = [
|
||||
[
|
||||
"'secure' cookie visible in `document.cookie`",
|
||||
function () {
|
||||
document.cookie = "secure_from_secure_dom=1; secure; path=/";
|
||||
assert_not_equals(document.cookie.match(/secure_from_secure_dom=1/), null);
|
||||
this.done();
|
||||
}
|
||||
],
|
||||
[
|
||||
"'secure' cookie visible in HTTP request",
|
||||
function () {
|
||||
document.cookie = "secure_from_secure_dom=1; secure; path=/";
|
||||
assert_not_equals(document.cookie.match(/secure_from_secure_dom=1/), null);
|
||||
fetch("https://{{host}}:{{ports[https][0]}}/cookies/resources/echo-json.py",
|
||||
{ "credentials": "include" })
|
||||
.then(this.step_func(function (r) {
|
||||
return r.json();
|
||||
}))
|
||||
.then(this.step_func_done(function (j) {
|
||||
assert_equals(j["secure_from_secure_dom"], "secure_from_secure_dom=1");
|
||||
}));
|
||||
}
|
||||
]
|
||||
];
|
||||
|
||||
function clearKnownCookie() {
|
||||
document.cookie = "secure_from_secure_dom=0; Secure; expires=Thu, 01 Jan 1970 00:00:01 GMT; path=/";
|
||||
}
|
||||
|
||||
executeTestsSerially(tests, clearKnownCookie, clearKnownCookie);
|
||||
</script>
|
||||
</body>
|
||||
</html>
|
|
@ -0,0 +1,47 @@
|
|||
<!doctype html>
|
||||
<html>
|
||||
<head>
|
||||
<meta charset=utf-8>
|
||||
<title>Set 'secure' cookie from `document.cookie` on a non-secure page</title>
|
||||
<meta name=help href="https://tools.ietf.org/html/draft-west-leave-secure-cookies-alone">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<script src="/cookies/resources/testharness-helpers.js"></script>
|
||||
</head>
|
||||
<body>
|
||||
<div id=log></div>
|
||||
<script>
|
||||
var tests = [
|
||||
[
|
||||
"'secure' cookie not set in `document.cookie`",
|
||||
function () {
|
||||
var originalCookie = document.cookie;
|
||||
document.cookie = "secure_from_nonsecure_dom=1; secure; path=/";
|
||||
assert_equals(document.cookie, originalCookie);
|
||||
this.done();
|
||||
}
|
||||
],
|
||||
[
|
||||
"'secure' cookie not sent in HTTP request",
|
||||
function () {
|
||||
document.cookie = "secure_from_nonsecure_dom=1; secure; path=/";
|
||||
fetch("https://{{host}}:{{ports[https][0]}}/cookies/resources/echo-json.py", { "credentials": "include" })
|
||||
.then(this.step_func(function (r) {
|
||||
return r.json();
|
||||
}))
|
||||
.then(this.step_func_done(function (j) {
|
||||
assert_equals(j["secure_from_nonsecure_dom"], undefined);
|
||||
}));
|
||||
}
|
||||
]
|
||||
];
|
||||
|
||||
function clearKnownCookie() {
|
||||
document.cookie = "secure_from_nonsecure_dom=0; Secure; expires=Thu, 01 Jan 1970 00:00:01 GMT; path=/";
|
||||
}
|
||||
|
||||
executeTestsSerially(tests, clearKnownCookie, clearKnownCookie);
|
||||
</script>
|
||||
</body>
|
||||
</html>
|
||||
|
|
@ -0,0 +1,36 @@
|
|||
<!doctype html>
|
||||
<html>
|
||||
<head>
|
||||
<meta charset=utf-8>
|
||||
<title>Set 'secure' cookie from `Set-Cookie` HTTP header on a secure page</title>
|
||||
<meta name=help href="https://tools.ietf.org/html/draft-west-leave-secure-cookies-alone">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<script src="/cookies/resources/testharness-helpers.js"></script>
|
||||
</head>
|
||||
<body>
|
||||
<div id=log></div>
|
||||
<script>
|
||||
function clearKnownCookie() {
|
||||
document.cookie = "secure_from_secure_http=0; Secure; expires=Thu, 01 Jan 1970 00:00:01 GMT; path=/";
|
||||
}
|
||||
|
||||
test(function () {
|
||||
assert_not_equals(document.cookie.match(/secure_from_secure_http=1/), null);
|
||||
}, "'secure' cookie present in `document.cookie`");
|
||||
|
||||
promise_test(function (t) {
|
||||
t.add_cleanup(clearKnownCookie);
|
||||
return fetch("https://{{host}}:{{ports[https][0]}}/cookies/resources/echo-json.py",
|
||||
{ "credentials": "include" })
|
||||
.then(function (r) {
|
||||
return r.json();
|
||||
})
|
||||
.then(function (j) {
|
||||
assert_equals(j["secure_from_secure_http"], "secure_from_secure_http=1");
|
||||
});
|
||||
}, "'secure' cookie sent in HTTP request");
|
||||
</script>
|
||||
</body>
|
||||
</html>
|
||||
|
|
@ -0,0 +1,5 @@
|
|||
Expires: Mon, 26 Jul 1997 05:00:00 GMT
|
||||
Cache-Control: no-store, no-cache, must-revalidate
|
||||
Cache-Control: post-check=0, pre-check=0, false
|
||||
Pragma: no-cache
|
||||
Set-Cookie: secure_from_secure_http=1; Secure; Path=/
|
|
@ -0,0 +1,36 @@
|
|||
<!doctype html>
|
||||
<html>
|
||||
<head>
|
||||
<meta charset=utf-8>
|
||||
<title>Set 'secure' cookie from `Set-Cookie` HTTP header on a non-secure page</title>
|
||||
<meta name=help href="https://tools.ietf.org/html/draft-west-leave-secure-cookies-alone">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<script src="/cookies/resources/testharness-helpers.js"></script>
|
||||
</head>
|
||||
<body>
|
||||
<div id=log></div>
|
||||
<script>
|
||||
function clearKnownCookie() {
|
||||
document.cookie = "secure_from_nonsecure_http=0; Secure; expires=Thu, 01 Jan 1970 00:00:01 GMT; path=/";
|
||||
}
|
||||
|
||||
test(function () {
|
||||
assert_equals(document.cookie.match(/secure_from_nonsecure_http=1/), null);
|
||||
}, "'secure' cookie not present in `document.cookie`");
|
||||
|
||||
promise_test(function (t) {
|
||||
t.add_cleanup(clearKnownCookie);
|
||||
return fetch("https://{{host}}:{{ports[https][0]}}/cookies/resources/echo-json.py",
|
||||
{ "credentials": "include" })
|
||||
.then(function (r) {
|
||||
return r.json();
|
||||
})
|
||||
.then(function (j) {
|
||||
assert_equals(j["secure_from_nonsecure_http"], undefined);
|
||||
});
|
||||
}, "'secure' cookie not sent in HTTP request");
|
||||
</script>
|
||||
</body>
|
||||
</html>
|
||||
|
|
@ -0,0 +1,5 @@
|
|||
Expires: Mon, 26 Jul 1997 05:00:00 GMT
|
||||
Cache-Control: no-store, no-cache, must-revalidate
|
||||
Cache-Control: post-check=0, pre-check=0, false
|
||||
Pragma: no-cache
|
||||
Set-Cookie: secure_from_nonsecure_http=1; Secure; Path=/
|
|
@ -0,0 +1,45 @@
|
|||
<!doctype html>
|
||||
<html>
|
||||
<head>
|
||||
<meta charset=utf-8>
|
||||
<title>Set 'secure' cookie from `Set-Cookie` HTTP header on a non-secure WebSocket</title>
|
||||
<meta name=help href="https://tools.ietf.org/html/draft-west-leave-secure-cookies-alone">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<script src="/cookies/resources/testharness-helpers.js"></script>
|
||||
</head>
|
||||
<body>
|
||||
<div id=log></div>
|
||||
<script>
|
||||
function clearKnownCookie() {
|
||||
document.cookie = "ws_test_secure_from_nonsecure=0; Secure; expires=Thu, 01 Jan 1970 00:00:01 GMT; path=/";
|
||||
}
|
||||
|
||||
async_test(function (t) {
|
||||
t.add_cleanup(clearKnownCookie);
|
||||
assert_equals(document.cookie.match(/ws_test_secure_from_nonsecure=/), null);
|
||||
|
||||
clearKnownCookie();
|
||||
var ws = new WebSocket("ws://{{host}}:{{ports[ws][0]}}/set-cookie-secure?secure_from_nonsecure");
|
||||
ws.onclose = t.step_func_done(function () {
|
||||
assert_unreached("'close' should not fire before 'open'.");
|
||||
});
|
||||
ws.onopen = t.step_func(function (e) {
|
||||
ws.onclose = null;
|
||||
ws.close();
|
||||
assert_false(/ws_test_secure_from_nonsecure=test/.test(document.cookie));
|
||||
|
||||
var ws2 = new WebSocket("wss://{{host}}:{{ports[wss][0]}}/echo-cookie");
|
||||
ws2.onclose = t.step_func_done(function () {
|
||||
assert_unreached("'close' should not fire before 'open'.");
|
||||
});
|
||||
ws2.onmessage = t.step_func_done(function (e) {
|
||||
ws2.onclose = null;
|
||||
ws2.close();
|
||||
assert_false(/ws_test_secure_from_nonsecure=test/.test(e.data));
|
||||
});
|
||||
});
|
||||
}, "'secure' cookie not sent in WSS request when set from WS");
|
||||
</script>
|
||||
</body>
|
||||
</html>
|
|
@ -0,0 +1,44 @@
|
|||
<!doctype html>
|
||||
<html>
|
||||
<head>
|
||||
<meta charset=utf-8>
|
||||
<title>Set 'secure' cookie from `Set-Cookie` HTTP header on a secure WebSocket</title>
|
||||
<meta name=help href="https://tools.ietf.org/html/draft-west-leave-secure-cookies-alone">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<script src="/cookies/resources/testharness-helpers.js"></script>
|
||||
</head>
|
||||
<body>
|
||||
<div id=log></div>
|
||||
<script>
|
||||
function clearKnownCookie() {
|
||||
document.cookie = "ws_test_secure_from_secure=0; Secure; expires=Thu, 01 Jan 1970 00:00:01 GMT; path=/";
|
||||
}
|
||||
|
||||
async_test(function (t) {
|
||||
t.add_cleanup(clearKnownCookie);
|
||||
assert_equals(document.cookie.match(/ws_test_secure_from_secure=/), null);
|
||||
|
||||
clearKnownCookie();
|
||||
var ws = new WebSocket("wss://{{host}}:{{ports[wss][0]}}/set-cookie-secure?secure_from_secure");
|
||||
ws.onclose = t.step_func_done(function () {
|
||||
assert_unreached("'close' should not fire before 'open'.");
|
||||
});
|
||||
ws.onopen = t.step_func(function (e) {
|
||||
ws.onclose = null;
|
||||
ws.close();
|
||||
assert_regexp_match(document.cookie, /ws_test_secure_from_secure=test/);
|
||||
var ws2 = new WebSocket("wss://{{host}}:{{ports[wss][0]}}/echo-cookie");
|
||||
ws2.onclose = t.step_func_done(function () {
|
||||
assert_unreached("'close' should not fire before 'open'.");
|
||||
});
|
||||
ws2.onmessage = t.step_func_done(function (e) {
|
||||
ws2.onclose = null;
|
||||
ws2.close();
|
||||
assert_regexp_match(e.data, /ws_test_secure_from_secure=test/);
|
||||
});
|
||||
});
|
||||
}, "'secure' cookie not sent in HTTP request");
|
||||
</script>
|
||||
</body>
|
||||
</html>
|
|
@ -10,6 +10,8 @@
|
|||
<script src="/resources/testharnessreport.js"></script>
|
||||
<div id=log></div>
|
||||
<iframe name="bar"></iframe>
|
||||
<iframe name="baz"></iframe>
|
||||
<iframe name="baz"></iframe>
|
||||
<iframe name="constructor"></iframe>
|
||||
<script>
|
||||
function assert_data_propdesc(pd, Writable, Enumerable, Configurable) {
|
||||
|
@ -31,7 +33,7 @@ test(function() {
|
|||
assert_true("bar" in gsp, "bar in gsp");
|
||||
assert_true(gsp.hasOwnProperty("bar"), "gsp.hasOwnProperty(\"bar\")");
|
||||
assert_data_propdesc(Object.getOwnPropertyDescriptor(gsp, "bar"),
|
||||
false, true, true);
|
||||
true, false, true);
|
||||
}, "Static name on the prototype");
|
||||
test(function() {
|
||||
assert_equals(window.constructor, Window);
|
||||
|
@ -45,10 +47,15 @@ test(function() {
|
|||
|
||||
var gsp = Object.getPrototypeOf(proto);
|
||||
assert_true("constructor" in gsp, "constructor in gsp");
|
||||
assert_true(gsp.hasOwnProperty("constructor"), "gsp.hasOwnProperty(\"constructor\")");
|
||||
assert_data_propdesc(Object.getOwnPropertyDescriptor(gsp, "constructor"),
|
||||
false, true, true);
|
||||
assert_false(gsp.hasOwnProperty("constructor"), "gsp.hasOwnProperty(\"constructor\")");
|
||||
assert_equals(Object.getOwnPropertyDescriptor(gsp, "constructor"), undefined);
|
||||
}, "constructor");
|
||||
test(function() {
|
||||
var gsp = Object.getPrototypeOf(Object.getPrototypeOf(window));
|
||||
var names = Object.getOwnPropertyNames(gsp);
|
||||
assert_equals(names.filter((name) => name == "baz").length, 1);
|
||||
|
||||
}, "duplicate property names")
|
||||
var t = async_test("Dynamic name")
|
||||
var t2 = async_test("Ghost name")
|
||||
t.step(function() {
|
||||
|
|
|
@ -5,7 +5,7 @@ var embeddedElements = {
|
|||
alt: "string",
|
||||
src: "url",
|
||||
srcset: "string",
|
||||
crossOrigin: {type: "enum", keywords: ["", "anonymous", "use-credentials"]},
|
||||
crossOrigin: {type: "enum", keywords: ["anonymous", "use-credentials"], nonCanon:{"": "anonymous"}, isNullable: true, defaultVal: null, invalidVal: "anonymous"},
|
||||
useMap: "string",
|
||||
isMap: "boolean",
|
||||
width: {type: "unsigned long", customGetter: true},
|
||||
|
@ -84,7 +84,7 @@ var embeddedElements = {
|
|||
video: {
|
||||
// HTMLMediaElement
|
||||
src: "url",
|
||||
crossOrigin: {type: "enum", keywords: ["anonymous", "use-credentials"], nonCanon:{"": "anonymous"}},
|
||||
crossOrigin: {type: "enum", keywords: ["anonymous", "use-credentials"], nonCanon:{"": "anonymous"}, isNullable: true, defaultVal: null, invalidVal: "anonymous"},
|
||||
// As with "keytype", we have no missing value default defined here.
|
||||
preload: {type: "enum", keywords: ["none", "metadata", "auto"], nonCanon: {"": "auto"}, defaultVal: null},
|
||||
autoplay: "boolean",
|
||||
|
@ -100,7 +100,7 @@ var embeddedElements = {
|
|||
audio: {
|
||||
// HTMLMediaElement
|
||||
src: "url",
|
||||
crossOrigin: {type: "enum", keywords: ["anonymous", "use-credentials"], nonCanon:{"": "anonymous"}},
|
||||
crossOrigin: {type: "enum", keywords: ["anonymous", "use-credentials"], nonCanon:{"": "anonymous"}, isNullable: true, defaultVal: null, invalidVal: "anonymous"},
|
||||
// As with "keytype", we have no missing value default defined here.
|
||||
preload: {type: "enum", keywords: ["none", "metadata", "auto"], nonCanon: {"": "auto"}, defaultVal: null},
|
||||
autoplay: "boolean",
|
||||
|
|
|
@ -13,7 +13,7 @@ var miscElements = {
|
|||
charset: "string",
|
||||
// TODO: async attribute (complicated).
|
||||
defer: "boolean",
|
||||
crossOrigin: {type: "enum", keywords: ["anonymous", "use-credentials"], nonCanon:{"": "anonymous"}},
|
||||
crossOrigin: {type: "enum", keywords: ["anonymous", "use-credentials"], nonCanon:{"": "anonymous"}, isNullable: true, defaultVal: null, invalidVal: "anonymous"},
|
||||
},
|
||||
noscript: {},
|
||||
|
||||
|
|
|
@ -859,7 +859,7 @@ typedef (Int8Array or Uint8Array or Uint8ClampedArray or
|
|||
[NoInterfaceObject, Exposed=Window]
|
||||
interface HTMLHyperlinkElementUtils {
|
||||
stringifier attribute USVString href;
|
||||
attribute USVString origin;
|
||||
readonly attribute USVString origin;
|
||||
attribute USVString protocol;
|
||||
attribute USVString username;
|
||||
attribute USVString password;
|
||||
|
@ -871,11 +871,11 @@ interface HTMLHyperlinkElementUtils {
|
|||
attribute USVString hash;
|
||||
};
|
||||
|
||||
interface HTMLAllCollection : HTMLCollection {
|
||||
// inherits length and 'getter'
|
||||
Element? item(unsigned long index);
|
||||
interface HTMLAllCollection {
|
||||
readonly attribute unsigned long length;
|
||||
getter Element? item(unsigned long index);
|
||||
(HTMLCollection or Element)? item(DOMString name);
|
||||
legacycaller getter (HTMLCollection or Element)? namedItem(DOMString name); // shadows inherited namedItem()
|
||||
legacycaller getter (HTMLCollection or Element)? namedItem(DOMString name);
|
||||
};
|
||||
|
||||
interface HTMLFormControlsCollection : HTMLCollection {
|
||||
|
@ -1048,7 +1048,7 @@ interface HTMLBaseElement : HTMLElement {
|
|||
|
||||
interface HTMLLinkElement : HTMLElement {
|
||||
attribute DOMString href;
|
||||
attribute DOMString crossOrigin;
|
||||
attribute DOMString? crossOrigin;
|
||||
attribute DOMString rel;
|
||||
[PutForwards=value] readonly attribute DOMTokenList relList;
|
||||
attribute DOMString media;
|
||||
|
@ -1173,7 +1173,7 @@ interface HTMLImageElement : HTMLElement {
|
|||
attribute DOMString src;
|
||||
attribute DOMString srcset;
|
||||
attribute DOMString sizes;
|
||||
attribute DOMString crossOrigin;
|
||||
attribute DOMString? crossOrigin;
|
||||
attribute DOMString useMap;
|
||||
attribute boolean isMap;
|
||||
attribute unsigned long width;
|
||||
|
@ -1286,7 +1286,7 @@ interface HTMLMediaElement : HTMLElement {
|
|||
// network state
|
||||
attribute DOMString src;
|
||||
readonly attribute DOMString currentSrc;
|
||||
attribute DOMString crossOrigin;
|
||||
attribute DOMString? crossOrigin;
|
||||
const unsigned short NETWORK_EMPTY = 0;
|
||||
const unsigned short NETWORK_IDLE = 1;
|
||||
const unsigned short NETWORK_LOADING = 2;
|
||||
|
@ -1949,7 +1949,7 @@ interface HTMLScriptElement : HTMLElement {
|
|||
attribute DOMString charset;
|
||||
attribute boolean async;
|
||||
attribute boolean defer;
|
||||
attribute DOMString crossOrigin;
|
||||
attribute DOMString? crossOrigin;
|
||||
attribute DOMString text;
|
||||
|
||||
// also has obsolete members
|
||||
|
@ -2304,7 +2304,7 @@ Window implements GlobalEventHandlers;
|
|||
Window implements WindowEventHandlers;
|
||||
|
||||
interface BarProp {
|
||||
attribute boolean visible;
|
||||
readonly attribute boolean visible;
|
||||
};
|
||||
|
||||
enum ScrollRestoration { "auto", "manual" };
|
||||
|
@ -2322,7 +2322,7 @@ interface History {
|
|||
|
||||
[Unforgeable] interface Location {
|
||||
stringifier attribute USVString href;
|
||||
attribute USVString origin;
|
||||
readonly attribute USVString origin;
|
||||
attribute USVString protocol;
|
||||
attribute USVString host;
|
||||
attribute USVString hostname;
|
||||
|
|
|
@ -271,6 +271,7 @@ ReflectionTests.typeMap = {
|
|||
* "keywords": array of keywords as given by the spec (required)
|
||||
* "nonCanon": dictionary mapping non-canonical values to their
|
||||
* canonical equivalents (defaults to {})
|
||||
* "isNullable": Indicates if attribute is nullable (defaults to false)
|
||||
*
|
||||
* Tests are mostly hardcoded into reflects(), since they depend on the
|
||||
* keywords. All expected values are computed in reflects() using a helper
|
||||
|
@ -592,9 +593,14 @@ ReflectionTests.doReflects = function(data, idlName, idlObj, domName, domObj) {
|
|||
|
||||
var typeInfo = this.typeMap[data.type];
|
||||
|
||||
if (typeof data.isNullable == "undefined") {
|
||||
data.isNullable = false;
|
||||
}
|
||||
|
||||
// Test that typeof idlObj[idlName] is correct. If not, further tests are
|
||||
// probably pointless, so bail out.
|
||||
if (!ReflectionHarness.test(typeof idlObj[idlName], typeInfo.jsType, "typeof IDL attribute")) {
|
||||
var isDefaultValueNull = data.isNullable && data.defaultVal === null;
|
||||
if (!ReflectionHarness.test(typeof idlObj[idlName], isDefaultValueNull ? "object" : typeInfo.jsType, "typeof IDL attribute")) {
|
||||
return;
|
||||
}
|
||||
|
||||
|
@ -603,7 +609,7 @@ ReflectionTests.doReflects = function(data, idlName, idlObj, domName, domObj) {
|
|||
if (defaultVal === undefined) {
|
||||
defaultVal = typeInfo.defaultVal;
|
||||
}
|
||||
if (defaultVal !== null) {
|
||||
if (defaultVal !== null || data.isNullable) {
|
||||
ReflectionHarness.test(idlObj[idlName], defaultVal, "IDL get with DOM attribute unset");
|
||||
}
|
||||
|
||||
|
@ -650,7 +656,14 @@ ReflectionTests.doReflects = function(data, idlName, idlObj, domName, domObj) {
|
|||
|
||||
// Per spec, the expected DOM values are the same as the value we set
|
||||
// it to.
|
||||
idlDomExpected = idlTests.slice(0);
|
||||
if (!data.isNullable) {
|
||||
idlDomExpected = idlTests.slice(0);
|
||||
} else {
|
||||
idlDomExpected = [];
|
||||
for (var i = 0; i < idlTests.length; i++) {
|
||||
idlDomExpected.push((idlTests[i] === null || idlTests[i] === undefined) ? null : idlTests[i]);
|
||||
}
|
||||
}
|
||||
|
||||
// Now we have the fun of calculating what the expected IDL values are.
|
||||
domExpected = [];
|
||||
|
@ -659,7 +672,11 @@ ReflectionTests.doReflects = function(data, idlName, idlObj, domName, domObj) {
|
|||
domExpected.push(this.enumExpected(data.keywords, data.nonCanon, data.invalidVal, domTests[i]));
|
||||
}
|
||||
for (var i = 0; i < idlTests.length; i++) {
|
||||
idlIdlExpected.push(this.enumExpected(data.keywords, data.nonCanon, data.invalidVal, idlTests[i]));
|
||||
if (data.isNullable && (idlTests[i] === null || idlTests[i] === undefined)) {
|
||||
idlIdlExpected.push(null);
|
||||
} else {
|
||||
idlIdlExpected.push(this.enumExpected(data.keywords, data.nonCanon, data.invalidVal, idlTests[i]));
|
||||
}
|
||||
}
|
||||
break;
|
||||
|
||||
|
@ -687,7 +704,7 @@ ReflectionTests.doReflects = function(data, idlName, idlObj, domName, domObj) {
|
|||
|
||||
if (!data.customGetter) {
|
||||
for (var i = 0; i < domTests.length; i++) {
|
||||
if (domExpected[i] === null) {
|
||||
if (domExpected[i] === null && !data.isNullable) {
|
||||
// If you follow all the complicated logic here, you'll find that
|
||||
// this will only happen if there's no expected value at all (like
|
||||
// for tabIndex, where the default is too complicated). So skip
|
||||
|
@ -723,10 +740,14 @@ ReflectionTests.doReflects = function(data, idlName, idlObj, domName, domObj) {
|
|||
if (data.type == "boolean") {
|
||||
// Special case yay
|
||||
ReflectionHarness.test(domObj.hasAttribute(domName), Boolean(idlTests[i]), "IDL set to " + ReflectionHarness.stringRep(idlTests[i]) + " followed by hasAttribute()");
|
||||
} else if (idlDomExpected[i] !== null) {
|
||||
ReflectionHarness.test(domObj.getAttribute(domName), idlDomExpected[i] + "", "IDL set to " + ReflectionHarness.stringRep(idlTests[i]) + " followed by getAttribute()");
|
||||
} else if (idlDomExpected[i] !== null || data.isNullable) {
|
||||
var expected = idlDomExpected[i] + "";
|
||||
if (data.isNullable && idlDomExpected[i] === null) {
|
||||
expected = null;
|
||||
}
|
||||
ReflectionHarness.test(domObj.getAttribute(domName), expected, "IDL set to " + ReflectionHarness.stringRep(idlTests[i]) + " followed by getAttribute()");
|
||||
}
|
||||
if (idlIdlExpected[i] !== null) {
|
||||
if (idlIdlExpected[i] !== null || data.isNullable) {
|
||||
ReflectionHarness.test(idlObj[idlName], idlIdlExpected[i], "IDL set to " + ReflectionHarness.stringRep(idlTests[i]) + " followed by IDL get");
|
||||
}
|
||||
if (ReflectionHarness.catchUnexpectedExceptions) {
|
||||
|
|
|
@ -0,0 +1,32 @@
|
|||
<!doctype html>
|
||||
<meta charset=utf-8>
|
||||
<title>img update media</title>
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<script>
|
||||
var t = async_test('set media after src updates selected image');
|
||||
|
||||
var img;
|
||||
|
||||
onload = t.step_func(function() {
|
||||
img = document.querySelector('img');
|
||||
img.addEventListener('load', t.step_func_done(onImgLoad));
|
||||
|
||||
var source = document.querySelector('source[data-media]');
|
||||
source.setAttribute('media', source.getAttribute('data-media'));
|
||||
});
|
||||
|
||||
function onImgLoad() {
|
||||
img.removeEventListener('load', onImgLoad);
|
||||
|
||||
assert_true(img.currentSrc.indexOf(img.getAttribute('data-expect')) > -1);
|
||||
}
|
||||
|
||||
</script>
|
||||
|
||||
<div id="log"></div>
|
||||
<picture>
|
||||
<source srcset="/images/fail.gif" data-media="(max-width: 1px)" />
|
||||
<source srcset="/images/smiley.png" />
|
||||
<img data-expect="/images/smiley.png">
|
||||
</picture>
|
|
@ -42,6 +42,10 @@
|
|||
input.value = " foo\rbar ";
|
||||
});
|
||||
assert_equals(input.value, "");
|
||||
} else if (types[j].type === "file") {
|
||||
input.value = " foo\rbar ";
|
||||
input.type = types[j].type; // change state
|
||||
assert_equals(input.value, "");
|
||||
} else {
|
||||
input.value = " foo\rbar ";
|
||||
input.type = types[j].type; // change state
|
||||
|
|
|
@ -0,0 +1,18 @@
|
|||
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0//EN">
|
||||
<html>
|
||||
<head>
|
||||
<title>CSS Selectors (:checked)</title>
|
||||
<link rel="author" title="Ian Hickson" href="mailto:ian@hixie.ch"/>
|
||||
<link rel="alternate" href="http://www.hixie.ch/tests/adhoc/css/selectors/checked/001.html"/>
|
||||
<style type="text/css">
|
||||
:checked, :checked + span { border: solid blue; color: blue; background: navy; }
|
||||
</style>
|
||||
</head>
|
||||
<body>
|
||||
<p>Anything that is checked below should be blue.</p>
|
||||
<p><input checked type="checkbox"> <span>X</span></p>
|
||||
<p><input checked type="radio" name="x"> <span>X</span> <input checked type="radio" name="x"> <span>X</span></p>
|
||||
<p><select><option selected>X</option></select></p>
|
||||
<p><select size="2"><option selected>X</option></select></p>
|
||||
</body>
|
||||
</html>
|
|
@ -0,0 +1,26 @@
|
|||
<!DOCTYPE HTML>
|
||||
<meta charset="utf-8">
|
||||
<title>:indeterminate and input type=radio</title>
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<style type="text/css">
|
||||
#test {
|
||||
color: green;
|
||||
}
|
||||
input:indeterminate + #test {
|
||||
color: red;
|
||||
}
|
||||
</style>
|
||||
<input type="radio" name="radios">
|
||||
<div id="test"></div>
|
||||
<input type="radio" name="radios" checked>
|
||||
<script type="text/javascript">
|
||||
test(function() {
|
||||
document.getElementsByTagName("input")[0].indeterminate = true;
|
||||
var target = document.getElementById("test");
|
||||
var val = getComputedStyle(target, null).getPropertyValue("color");
|
||||
assert_equals(val, "rgb(0, 128, 0)",
|
||||
"The indeterminate IDL attribute should not cause the " +
|
||||
":indeterminate pseudo-class to match on input type=radio");
|
||||
})
|
||||
</script>
|
24
tests/wpt/web-platform-tests/presentation-api/README.md
Normal file
24
tests/wpt/web-platform-tests/presentation-api/README.md
Normal file
|
@ -0,0 +1,24 @@
|
|||
# Presentation API Tests
|
||||
|
||||
This test suite is currently tracking the [Editor Draft][editor-draft] of the Presentation API. The Presentation API describes the [conformance criteria for two classes of user agents][conformance-classes] ([controlling user agent][dfn-controlling-user-agent] and [receiving user agent][dfn-receiving-user-agent]). Each of the two subfolders [controlling-ua](./controlling-ua) and [receiving-ua](./receiving-ua) contains the Presentation API tests for each class of user agents.
|
||||
|
||||
## IDL Tests
|
||||
|
||||
Each of the [controlling-ua](./controlling-ua) and [receiving-ua](./receiving-ua) subfolders contains a file `idlharness.html` that defines IDL tests of the Presentation API for controlling and receiving user agents. The WebIDL of the Presentation API spec is extracted from the [Editor Draft][editor-draft] by running the following JavaScript code in the Dev. console of the Browser.
|
||||
|
||||
```javascript
|
||||
(function(){
|
||||
var s = "";
|
||||
[].forEach.call(document.getElementsByClassName("idl"), function(idl) {
|
||||
if (!idl.classList.contains("extract"))
|
||||
s += idl.textContent + "\n\n";
|
||||
});
|
||||
document.body.innerHTML = '<pre></pre>';
|
||||
document.body.firstChild.textContent = s;
|
||||
})();
|
||||
```
|
||||
|
||||
[editor-draft]: http://w3c.github.io/presentation-api/
|
||||
[conformance-classes]: http://w3c.github.io/presentation-api/#conformance-classes
|
||||
[dfn-controlling-user-agent]: http://w3c.github.io/presentation-api/#dfn-controlling-user-agent
|
||||
[dfn-receiving-user-agent]: http://w3c.github.io/presentation-api/#dfn-receiving-user-agent
|
|
@ -0,0 +1,121 @@
|
|||
<!DOCTYPE html>
|
||||
<meta charset="utf-8">
|
||||
<title>Presentation API IDL tests for Controlling User Agent</title>
|
||||
<link rel="author" title="Louay Bassbouss" href="http://www.fokus.fraunhofer.de">
|
||||
<link rel="help" href="http://w3c.github.io/presentation-api/#dfn-controlling-user-agent">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<script src="/resources/WebIDLParser.js"></script>
|
||||
<script src="/resources/idlharness.js"></script>
|
||||
|
||||
<script id="untested_idl" type="text/plain">
|
||||
interface Navigator {
|
||||
};
|
||||
interface EventTarget {
|
||||
};
|
||||
interface EventHandler {
|
||||
};
|
||||
interface Event {
|
||||
};
|
||||
dictionary EventInit {
|
||||
};
|
||||
</script>
|
||||
|
||||
<script id='idl' type="text/plain">
|
||||
partial interface Navigator {
|
||||
[SameObject]
|
||||
readonly attribute Presentation? presentation;
|
||||
};
|
||||
|
||||
interface Presentation {
|
||||
};
|
||||
|
||||
partial interface Presentation {
|
||||
attribute PresentationRequest? defaultRequest;
|
||||
};
|
||||
|
||||
[Constructor(DOMString url)]
|
||||
interface PresentationRequest : EventTarget {
|
||||
Promise<PresentationConnection> start();
|
||||
Promise<PresentationConnection> reconnect(DOMString presentationId);
|
||||
Promise<PresentationAvailability> getAvailability();
|
||||
attribute EventHandler onconnectionavailable;
|
||||
};
|
||||
|
||||
interface PresentationAvailability : EventTarget {
|
||||
readonly attribute boolean value;
|
||||
attribute EventHandler onchange;
|
||||
};
|
||||
|
||||
[Constructor(DOMString type, PresentationConnectionAvailableEventInit eventInitDict)]
|
||||
interface PresentationConnectionAvailableEvent : Event {
|
||||
[SameObject]
|
||||
readonly attribute PresentationConnection connection;
|
||||
};
|
||||
|
||||
dictionary PresentationConnectionAvailableEventInit : EventInit {
|
||||
required PresentationConnection connection;
|
||||
};
|
||||
|
||||
enum PresentationConnectionState {
|
||||
"connecting",
|
||||
"connected",
|
||||
"closed",
|
||||
"terminated"
|
||||
};
|
||||
|
||||
enum BinaryType {
|
||||
"blob",
|
||||
"arraybuffer"
|
||||
};
|
||||
|
||||
interface PresentationConnection : EventTarget {
|
||||
readonly attribute DOMString? id;
|
||||
readonly attribute PresentationConnectionState state;
|
||||
void close();
|
||||
void terminate();
|
||||
attribute EventHandler onconnect;
|
||||
attribute EventHandler onclose;
|
||||
attribute EventHandler onterminate;
|
||||
// Communication
|
||||
attribute BinaryType binaryType;
|
||||
attribute EventHandler onmessage;
|
||||
void send(DOMString message);
|
||||
void send(Blob data);
|
||||
void send(ArrayBuffer data);
|
||||
void send(ArrayBufferView data);
|
||||
};
|
||||
|
||||
enum PresentationConnectionClosedReason {
|
||||
"error",
|
||||
"closed",
|
||||
"wentaway"
|
||||
};
|
||||
|
||||
[Constructor(DOMString type, PresentationConnectionClosedEventInit eventInitDict)]
|
||||
interface PresentationConnectionClosedEvent : Event {
|
||||
readonly attribute PresentationConnectionClosedReason reason;
|
||||
readonly attribute DOMString message;
|
||||
};
|
||||
|
||||
dictionary PresentationConnectionClosedEventInit : EventInit {
|
||||
required PresentationConnectionClosedReason reason;
|
||||
DOMString message;
|
||||
};
|
||||
</script>
|
||||
|
||||
<script>
|
||||
(function() {
|
||||
"use strict";
|
||||
var idl_array = new IdlArray();
|
||||
var idls = document.getElementById('idl').textContent;
|
||||
idl_array.add_untested_idls(document.getElementById('untested_idl').textContent);
|
||||
idl_array.add_idls(idls);
|
||||
idl_array.add_objects({
|
||||
Presentation: ['navigator.presentation'],
|
||||
PresentationRequest: ['navigator.presentation.defaultRequest', 'new PresentationRequest("/presentation-api/receiving-ua/idlharness.html")']
|
||||
});
|
||||
idl_array.test();
|
||||
})();
|
||||
</script>
|
||||
|
|
@ -0,0 +1,119 @@
|
|||
<!DOCTYPE html>
|
||||
<meta charset="utf-8">
|
||||
<title>Presentation API IDL tests for Receiving User Agent</title>
|
||||
<link rel="author" title="Louay Bassbouss" href="http://www.fokus.fraunhofer.de">
|
||||
<link rel="help" href="http://w3c.github.io/presentation-api/#dfn-receiving-user-agent">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<script src="/resources/WebIDLParser.js"></script>
|
||||
<script src="/resources/idlharness.js"></script>
|
||||
|
||||
<script id="untested_idl" type="text/plain">
|
||||
interface Navigator {
|
||||
};
|
||||
interface EventTarget {
|
||||
};
|
||||
interface EventHandler {
|
||||
};
|
||||
interface Event {
|
||||
};
|
||||
dictionary EventInit {
|
||||
};
|
||||
</script>
|
||||
|
||||
<script id='idl' type="text/plain">
|
||||
partial interface Navigator {
|
||||
[SameObject]
|
||||
readonly attribute Presentation? presentation;
|
||||
};
|
||||
|
||||
interface Presentation {
|
||||
};
|
||||
|
||||
partial interface Presentation {
|
||||
[SameObject]
|
||||
readonly attribute PresentationReceiver? receiver;
|
||||
};
|
||||
|
||||
[Constructor(DOMString type, PresentationConnectionAvailableEventInit eventInitDict)]
|
||||
interface PresentationConnectionAvailableEvent : Event {
|
||||
[SameObject]
|
||||
readonly attribute PresentationConnection connection;
|
||||
};
|
||||
|
||||
dictionary PresentationConnectionAvailableEventInit : EventInit {
|
||||
required PresentationConnection connection;
|
||||
};
|
||||
|
||||
enum PresentationConnectionState {
|
||||
"connecting",
|
||||
"connected",
|
||||
"closed",
|
||||
"terminated"
|
||||
};
|
||||
|
||||
enum BinaryType {
|
||||
"blob",
|
||||
"arraybuffer"
|
||||
};
|
||||
|
||||
interface PresentationConnection : EventTarget {
|
||||
readonly attribute DOMString? id;
|
||||
readonly attribute PresentationConnectionState state;
|
||||
void close();
|
||||
void terminate();
|
||||
attribute EventHandler onconnect;
|
||||
attribute EventHandler onclose;
|
||||
attribute EventHandler onterminate;
|
||||
// Communication
|
||||
attribute BinaryType binaryType;
|
||||
attribute EventHandler onmessage;
|
||||
void send(DOMString message);
|
||||
void send(Blob data);
|
||||
void send(ArrayBuffer data);
|
||||
void send(ArrayBufferView data);
|
||||
};
|
||||
|
||||
enum PresentationConnectionClosedReason {
|
||||
"error",
|
||||
"closed",
|
||||
"wentaway"
|
||||
};
|
||||
|
||||
[Constructor(DOMString type, PresentationConnectionClosedEventInit eventInitDict)]
|
||||
interface PresentationConnectionClosedEvent : Event {
|
||||
readonly attribute PresentationConnectionClosedReason reason;
|
||||
readonly attribute DOMString message;
|
||||
};
|
||||
|
||||
dictionary PresentationConnectionClosedEventInit : EventInit {
|
||||
required PresentationConnectionClosedReason reason;
|
||||
DOMString message;
|
||||
};
|
||||
|
||||
interface PresentationReceiver {
|
||||
[SameObject]
|
||||
readonly attribute Promise<PresentationConnectionList> connectionList;
|
||||
};
|
||||
|
||||
interface PresentationConnectionList : EventTarget {
|
||||
readonly attribute FrozenArray<PresentationConnection> connections;
|
||||
attribute EventHandler onconnectionavailable;
|
||||
};
|
||||
</script>
|
||||
|
||||
<script>
|
||||
(function() {
|
||||
"use strict";
|
||||
var idl_array = new IdlArray();
|
||||
var idls = document.getElementById('idl').textContent;
|
||||
idl_array.add_untested_idls(document.getElementById('untested_idl').textContent);
|
||||
idl_array.add_idls(idls);
|
||||
idl_array.add_objects({
|
||||
Presentation: ['navigator.presentation'],
|
||||
PresentationReceiver: ['navigator.presentation.receiver']
|
||||
});
|
||||
idl_array.test();
|
||||
})();
|
||||
</script>
|
||||
|
|
@ -19,21 +19,33 @@ function parseUrlQueryString(queryString) {
|
|||
return params;
|
||||
};
|
||||
|
||||
function appendIframeToBody(url) {
|
||||
function appendIframeToBody(url, attributes) {
|
||||
var iframe = document.createElement("iframe");
|
||||
iframe.src = url;
|
||||
// Extend element with attributes. (E.g. "referrer_policy" or "rel")
|
||||
if (attributes) {
|
||||
for (var attr in attributes) {
|
||||
iframe[attr] = attributes[attr];
|
||||
}
|
||||
}
|
||||
document.body.appendChild(iframe);
|
||||
|
||||
return iframe;
|
||||
}
|
||||
|
||||
function loadImage(src, callback) {
|
||||
function loadImage(src, callback, attributes) {
|
||||
var image = new Image();
|
||||
image.crossOrigin = "Anonymous";
|
||||
image.onload = function() {
|
||||
callback(image);
|
||||
}
|
||||
image.src = src;
|
||||
// Extend element with attributes. (E.g. "referrer_policy" or "rel")
|
||||
if (attributes) {
|
||||
for (var attr in attributes) {
|
||||
image[attr] = attributes[attr];
|
||||
}
|
||||
}
|
||||
document.body.appendChild(image)
|
||||
}
|
||||
|
||||
|
@ -61,14 +73,14 @@ function decodeImageData(rgba) {
|
|||
return JSON.parse(string_data);
|
||||
}
|
||||
|
||||
function decodeImage(url, callback) {
|
||||
function decodeImage(url, callback, referrer_policy) {
|
||||
loadImage(url, function(img) {
|
||||
var canvas = document.createElement("canvas");
|
||||
var context = canvas.getContext('2d');
|
||||
context.drawImage(img, 0, 0);
|
||||
var imgData = context.getImageData(0, 0, img.clientWidth, img.clientHeight);
|
||||
callback(decodeImageData(imgData.data))
|
||||
});
|
||||
}, referrer_policy);
|
||||
}
|
||||
|
||||
function normalizePort(targetPort) {
|
||||
|
@ -87,8 +99,8 @@ function wrapResult(url, server_data) {
|
|||
}
|
||||
}
|
||||
|
||||
function queryIframe(url, callback) {
|
||||
var iframe = appendIframeToBody(url);
|
||||
function queryIframe(url, callback, referrer_policy) {
|
||||
var iframe = appendIframeToBody(url, referrer_policy);
|
||||
var listener = function(event) {
|
||||
if (event.source != iframe.contentWindow)
|
||||
return;
|
||||
|
@ -99,10 +111,10 @@ function queryIframe(url, callback) {
|
|||
window.addEventListener("message", listener);
|
||||
}
|
||||
|
||||
function queryImage(url, callback) {
|
||||
function queryImage(url, callback, referrer_policy) {
|
||||
decodeImage(url, function(server_data) {
|
||||
callback(wrapResult(url, server_data), url);
|
||||
})
|
||||
}, referrer_policy)
|
||||
}
|
||||
|
||||
function queryXhr(url, callback) {
|
||||
|
|
|
@ -76,7 +76,7 @@ function ReferrerPolicyTestCase(scenario, testDescription, sanityChecker) {
|
|||
// Depending on the delivery method, extend the subresource element with
|
||||
// these attributes.
|
||||
var elementAttributesForDeliveryMethod = {
|
||||
"attr-referrer": {referrer: t._scenario.referrer_policy},
|
||||
"attr-referrer": {referrerpolicy: t._scenario.referrer_policy},
|
||||
"rel-noreferrer": {rel: "noreferrer"}
|
||||
};
|
||||
|
||||
|
|
|
@ -0,0 +1,25 @@
|
|||
<!DOCTYPE html>
|
||||
<html>
|
||||
<head>
|
||||
<title>Invalid referrerpolicy attribute value</title>
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
</head>
|
||||
<body>
|
||||
<h1>Invalid referrerpolicy attribute value</h1>
|
||||
<pre>Running...</pre>
|
||||
|
||||
<script>
|
||||
test(function () {
|
||||
var elements = ["iframe", "img", "a", "area"];
|
||||
for (var i = 0; i < elements.length; i++) {
|
||||
var elem = document.createElement(elements[i]);
|
||||
elem.referrerpolicy = "unsafe-url";
|
||||
assert_equals(elem.referrerpolicy, "unsafe-url");
|
||||
elem.referrerpolicy = "not-valid-value";
|
||||
assert_equals(elem.referrerpolicy, "");
|
||||
}
|
||||
}, "Invalid referrerpolicy values not reflected");
|
||||
</script>
|
||||
</body>
|
||||
</html>
|
|
@ -0,0 +1,40 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
|
||||
<meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-no-referrer-when-downgrade">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an http
|
||||
sub-resource via iframe-tag using the attr-referrer
|
||||
delivery method with keep-origin-redirect and when
|
||||
the target request is cross-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "no-referrer-when-downgrade",
|
||||
"delivery_method": "attr-referrer",
|
||||
"redirection": "keep-origin-redirect",
|
||||
"origin": "cross-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "http",
|
||||
"subresource": "iframe-tag",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/document.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -0,0 +1,40 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
|
||||
<meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-no-referrer-when-downgrade">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an http
|
||||
sub-resource via iframe-tag using the attr-referrer
|
||||
delivery method with no-redirect and when
|
||||
the target request is cross-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "no-referrer-when-downgrade",
|
||||
"delivery_method": "attr-referrer",
|
||||
"redirection": "no-redirect",
|
||||
"origin": "cross-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "http",
|
||||
"subresource": "iframe-tag",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/document.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -0,0 +1,40 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
|
||||
<meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-no-referrer-when-downgrade">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an http
|
||||
sub-resource via iframe-tag using the attr-referrer
|
||||
delivery method with swap-origin-redirect and when
|
||||
the target request is cross-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "no-referrer-when-downgrade",
|
||||
"delivery_method": "attr-referrer",
|
||||
"redirection": "swap-origin-redirect",
|
||||
"origin": "cross-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "http",
|
||||
"subresource": "iframe-tag",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/document.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -0,0 +1,40 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
|
||||
<meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-no-referrer-when-downgrade">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an http
|
||||
sub-resource via img-tag using the attr-referrer
|
||||
delivery method with keep-origin-redirect and when
|
||||
the target request is cross-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "no-referrer-when-downgrade",
|
||||
"delivery_method": "attr-referrer",
|
||||
"redirection": "keep-origin-redirect",
|
||||
"origin": "cross-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "http",
|
||||
"subresource": "img-tag",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/image.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -0,0 +1,40 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
|
||||
<meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-no-referrer-when-downgrade">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an http
|
||||
sub-resource via img-tag using the attr-referrer
|
||||
delivery method with no-redirect and when
|
||||
the target request is cross-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "no-referrer-when-downgrade",
|
||||
"delivery_method": "attr-referrer",
|
||||
"redirection": "no-redirect",
|
||||
"origin": "cross-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "http",
|
||||
"subresource": "img-tag",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/image.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -0,0 +1,40 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
|
||||
<meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-no-referrer-when-downgrade">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an http
|
||||
sub-resource via img-tag using the attr-referrer
|
||||
delivery method with swap-origin-redirect and when
|
||||
the target request is cross-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "no-referrer-when-downgrade",
|
||||
"delivery_method": "attr-referrer",
|
||||
"redirection": "swap-origin-redirect",
|
||||
"origin": "cross-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "http",
|
||||
"subresource": "img-tag",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/image.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -0,0 +1,40 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
|
||||
<meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-no-referrer-when-downgrade">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an https
|
||||
sub-resource via iframe-tag using the attr-referrer
|
||||
delivery method with keep-origin-redirect and when
|
||||
the target request is cross-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "no-referrer-when-downgrade",
|
||||
"delivery_method": "attr-referrer",
|
||||
"redirection": "keep-origin-redirect",
|
||||
"origin": "cross-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "https",
|
||||
"subresource": "iframe-tag",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/document.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -0,0 +1,40 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
|
||||
<meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-no-referrer-when-downgrade">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an https
|
||||
sub-resource via iframe-tag using the attr-referrer
|
||||
delivery method with no-redirect and when
|
||||
the target request is cross-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "no-referrer-when-downgrade",
|
||||
"delivery_method": "attr-referrer",
|
||||
"redirection": "no-redirect",
|
||||
"origin": "cross-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "https",
|
||||
"subresource": "iframe-tag",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/document.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -0,0 +1,40 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
|
||||
<meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-no-referrer-when-downgrade">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an https
|
||||
sub-resource via iframe-tag using the attr-referrer
|
||||
delivery method with swap-origin-redirect and when
|
||||
the target request is cross-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "no-referrer-when-downgrade",
|
||||
"delivery_method": "attr-referrer",
|
||||
"redirection": "swap-origin-redirect",
|
||||
"origin": "cross-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "https",
|
||||
"subresource": "iframe-tag",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/document.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -0,0 +1,40 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
|
||||
<meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-no-referrer-when-downgrade">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an https
|
||||
sub-resource via img-tag using the attr-referrer
|
||||
delivery method with keep-origin-redirect and when
|
||||
the target request is cross-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "no-referrer-when-downgrade",
|
||||
"delivery_method": "attr-referrer",
|
||||
"redirection": "keep-origin-redirect",
|
||||
"origin": "cross-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "https",
|
||||
"subresource": "img-tag",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/image.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -0,0 +1,40 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
|
||||
<meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-no-referrer-when-downgrade">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an https
|
||||
sub-resource via img-tag using the attr-referrer
|
||||
delivery method with no-redirect and when
|
||||
the target request is cross-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "no-referrer-when-downgrade",
|
||||
"delivery_method": "attr-referrer",
|
||||
"redirection": "no-redirect",
|
||||
"origin": "cross-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "https",
|
||||
"subresource": "img-tag",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/image.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -0,0 +1,40 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
|
||||
<meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-no-referrer-when-downgrade">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an https
|
||||
sub-resource via img-tag using the attr-referrer
|
||||
delivery method with swap-origin-redirect and when
|
||||
the target request is cross-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "no-referrer-when-downgrade",
|
||||
"delivery_method": "attr-referrer",
|
||||
"redirection": "swap-origin-redirect",
|
||||
"origin": "cross-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "https",
|
||||
"subresource": "img-tag",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/image.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -0,0 +1,40 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
|
||||
<meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-no-referrer-when-downgrade">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an http
|
||||
sub-resource via iframe-tag using the attr-referrer
|
||||
delivery method with keep-origin-redirect and when
|
||||
the target request is same-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "no-referrer-when-downgrade",
|
||||
"delivery_method": "attr-referrer",
|
||||
"redirection": "keep-origin-redirect",
|
||||
"origin": "same-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "http",
|
||||
"subresource": "iframe-tag",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/document.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -0,0 +1,40 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
|
||||
<meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-no-referrer-when-downgrade">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an http
|
||||
sub-resource via iframe-tag using the attr-referrer
|
||||
delivery method with no-redirect and when
|
||||
the target request is same-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "no-referrer-when-downgrade",
|
||||
"delivery_method": "attr-referrer",
|
||||
"redirection": "no-redirect",
|
||||
"origin": "same-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "http",
|
||||
"subresource": "iframe-tag",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/document.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -0,0 +1,40 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
|
||||
<meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-no-referrer-when-downgrade">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an http
|
||||
sub-resource via iframe-tag using the attr-referrer
|
||||
delivery method with swap-origin-redirect and when
|
||||
the target request is same-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "no-referrer-when-downgrade",
|
||||
"delivery_method": "attr-referrer",
|
||||
"redirection": "swap-origin-redirect",
|
||||
"origin": "same-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "http",
|
||||
"subresource": "iframe-tag",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/document.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -0,0 +1,40 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
|
||||
<meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-no-referrer-when-downgrade">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an http
|
||||
sub-resource via img-tag using the attr-referrer
|
||||
delivery method with keep-origin-redirect and when
|
||||
the target request is same-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "no-referrer-when-downgrade",
|
||||
"delivery_method": "attr-referrer",
|
||||
"redirection": "keep-origin-redirect",
|
||||
"origin": "same-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "http",
|
||||
"subresource": "img-tag",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/image.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -0,0 +1,40 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
|
||||
<meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-no-referrer-when-downgrade">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an http
|
||||
sub-resource via img-tag using the attr-referrer
|
||||
delivery method with no-redirect and when
|
||||
the target request is same-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "no-referrer-when-downgrade",
|
||||
"delivery_method": "attr-referrer",
|
||||
"redirection": "no-redirect",
|
||||
"origin": "same-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "http",
|
||||
"subresource": "img-tag",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/image.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -0,0 +1,40 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
|
||||
<meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-no-referrer-when-downgrade">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an http
|
||||
sub-resource via img-tag using the attr-referrer
|
||||
delivery method with swap-origin-redirect and when
|
||||
the target request is same-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "no-referrer-when-downgrade",
|
||||
"delivery_method": "attr-referrer",
|
||||
"redirection": "swap-origin-redirect",
|
||||
"origin": "same-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "http",
|
||||
"subresource": "img-tag",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/image.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -0,0 +1,40 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
|
||||
<meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-no-referrer-when-downgrade">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an https
|
||||
sub-resource via iframe-tag using the attr-referrer
|
||||
delivery method with keep-origin-redirect and when
|
||||
the target request is same-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "no-referrer-when-downgrade",
|
||||
"delivery_method": "attr-referrer",
|
||||
"redirection": "keep-origin-redirect",
|
||||
"origin": "same-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "https",
|
||||
"subresource": "iframe-tag",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/document.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -0,0 +1,40 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
|
||||
<meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-no-referrer-when-downgrade">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an https
|
||||
sub-resource via iframe-tag using the attr-referrer
|
||||
delivery method with no-redirect and when
|
||||
the target request is same-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "no-referrer-when-downgrade",
|
||||
"delivery_method": "attr-referrer",
|
||||
"redirection": "no-redirect",
|
||||
"origin": "same-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "https",
|
||||
"subresource": "iframe-tag",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/document.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -0,0 +1,40 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
|
||||
<meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-no-referrer-when-downgrade">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an https
|
||||
sub-resource via iframe-tag using the attr-referrer
|
||||
delivery method with swap-origin-redirect and when
|
||||
the target request is same-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "no-referrer-when-downgrade",
|
||||
"delivery_method": "attr-referrer",
|
||||
"redirection": "swap-origin-redirect",
|
||||
"origin": "same-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "https",
|
||||
"subresource": "iframe-tag",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/document.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -0,0 +1,40 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
|
||||
<meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-no-referrer-when-downgrade">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an https
|
||||
sub-resource via img-tag using the attr-referrer
|
||||
delivery method with keep-origin-redirect and when
|
||||
the target request is same-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "no-referrer-when-downgrade",
|
||||
"delivery_method": "attr-referrer",
|
||||
"redirection": "keep-origin-redirect",
|
||||
"origin": "same-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "https",
|
||||
"subresource": "img-tag",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/image.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -0,0 +1,40 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
|
||||
<meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-no-referrer-when-downgrade">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an https
|
||||
sub-resource via img-tag using the attr-referrer
|
||||
delivery method with no-redirect and when
|
||||
the target request is same-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "no-referrer-when-downgrade",
|
||||
"delivery_method": "attr-referrer",
|
||||
"redirection": "no-redirect",
|
||||
"origin": "same-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "https",
|
||||
"subresource": "img-tag",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/image.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -0,0 +1,40 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
|
||||
<meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-no-referrer-when-downgrade">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an https
|
||||
sub-resource via img-tag using the attr-referrer
|
||||
delivery method with swap-origin-redirect and when
|
||||
the target request is same-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "no-referrer-when-downgrade",
|
||||
"delivery_method": "attr-referrer",
|
||||
"redirection": "swap-origin-redirect",
|
||||
"origin": "same-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "https",
|
||||
"subresource": "img-tag",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/image.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -0,0 +1,40 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
|
||||
<meta name="description" content="Check that sub-resource never gets the referrer URL.">
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-no-referrer">
|
||||
<meta name="assert" content="The referrer URL is omitted when a
|
||||
document served over http requires an http
|
||||
sub-resource via iframe-tag using the attr-referrer
|
||||
delivery method with keep-origin-redirect and when
|
||||
the target request is cross-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "no-referrer",
|
||||
"delivery_method": "attr-referrer",
|
||||
"redirection": "keep-origin-redirect",
|
||||
"origin": "cross-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "http",
|
||||
"subresource": "iframe-tag",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/document.py",
|
||||
"referrer_url": "omitted"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -0,0 +1,40 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
|
||||
<meta name="description" content="Check that sub-resource never gets the referrer URL.">
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-no-referrer">
|
||||
<meta name="assert" content="The referrer URL is omitted when a
|
||||
document served over http requires an http
|
||||
sub-resource via iframe-tag using the attr-referrer
|
||||
delivery method with no-redirect and when
|
||||
the target request is cross-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "no-referrer",
|
||||
"delivery_method": "attr-referrer",
|
||||
"redirection": "no-redirect",
|
||||
"origin": "cross-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "http",
|
||||
"subresource": "iframe-tag",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/document.py",
|
||||
"referrer_url": "omitted"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -0,0 +1,40 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
|
||||
<meta name="description" content="Check that sub-resource never gets the referrer URL.">
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-no-referrer">
|
||||
<meta name="assert" content="The referrer URL is omitted when a
|
||||
document served over http requires an http
|
||||
sub-resource via iframe-tag using the attr-referrer
|
||||
delivery method with swap-origin-redirect and when
|
||||
the target request is cross-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "no-referrer",
|
||||
"delivery_method": "attr-referrer",
|
||||
"redirection": "swap-origin-redirect",
|
||||
"origin": "cross-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "http",
|
||||
"subresource": "iframe-tag",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/document.py",
|
||||
"referrer_url": "omitted"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -0,0 +1,40 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
|
||||
<meta name="description" content="Check that sub-resource never gets the referrer URL.">
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-no-referrer">
|
||||
<meta name="assert" content="The referrer URL is omitted when a
|
||||
document served over http requires an http
|
||||
sub-resource via img-tag using the attr-referrer
|
||||
delivery method with keep-origin-redirect and when
|
||||
the target request is cross-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "no-referrer",
|
||||
"delivery_method": "attr-referrer",
|
||||
"redirection": "keep-origin-redirect",
|
||||
"origin": "cross-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "http",
|
||||
"subresource": "img-tag",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/image.py",
|
||||
"referrer_url": "omitted"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -0,0 +1,40 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
|
||||
<meta name="description" content="Check that sub-resource never gets the referrer URL.">
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-no-referrer">
|
||||
<meta name="assert" content="The referrer URL is omitted when a
|
||||
document served over http requires an http
|
||||
sub-resource via img-tag using the attr-referrer
|
||||
delivery method with no-redirect and when
|
||||
the target request is cross-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "no-referrer",
|
||||
"delivery_method": "attr-referrer",
|
||||
"redirection": "no-redirect",
|
||||
"origin": "cross-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "http",
|
||||
"subresource": "img-tag",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/image.py",
|
||||
"referrer_url": "omitted"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -0,0 +1,40 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
|
||||
<meta name="description" content="Check that sub-resource never gets the referrer URL.">
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-no-referrer">
|
||||
<meta name="assert" content="The referrer URL is omitted when a
|
||||
document served over http requires an http
|
||||
sub-resource via img-tag using the attr-referrer
|
||||
delivery method with swap-origin-redirect and when
|
||||
the target request is cross-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "no-referrer",
|
||||
"delivery_method": "attr-referrer",
|
||||
"redirection": "swap-origin-redirect",
|
||||
"origin": "cross-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "http",
|
||||
"subresource": "img-tag",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/image.py",
|
||||
"referrer_url": "omitted"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -0,0 +1,40 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
|
||||
<meta name="description" content="Check that sub-resource never gets the referrer URL.">
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-no-referrer">
|
||||
<meta name="assert" content="The referrer URL is omitted when a
|
||||
document served over http requires an https
|
||||
sub-resource via iframe-tag using the attr-referrer
|
||||
delivery method with keep-origin-redirect and when
|
||||
the target request is cross-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "no-referrer",
|
||||
"delivery_method": "attr-referrer",
|
||||
"redirection": "keep-origin-redirect",
|
||||
"origin": "cross-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "https",
|
||||
"subresource": "iframe-tag",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/document.py",
|
||||
"referrer_url": "omitted"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -0,0 +1,40 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
|
||||
<meta name="description" content="Check that sub-resource never gets the referrer URL.">
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-no-referrer">
|
||||
<meta name="assert" content="The referrer URL is omitted when a
|
||||
document served over http requires an https
|
||||
sub-resource via iframe-tag using the attr-referrer
|
||||
delivery method with no-redirect and when
|
||||
the target request is cross-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "no-referrer",
|
||||
"delivery_method": "attr-referrer",
|
||||
"redirection": "no-redirect",
|
||||
"origin": "cross-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "https",
|
||||
"subresource": "iframe-tag",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/document.py",
|
||||
"referrer_url": "omitted"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -0,0 +1,40 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
|
||||
<meta name="description" content="Check that sub-resource never gets the referrer URL.">
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-no-referrer">
|
||||
<meta name="assert" content="The referrer URL is omitted when a
|
||||
document served over http requires an https
|
||||
sub-resource via iframe-tag using the attr-referrer
|
||||
delivery method with swap-origin-redirect and when
|
||||
the target request is cross-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "no-referrer",
|
||||
"delivery_method": "attr-referrer",
|
||||
"redirection": "swap-origin-redirect",
|
||||
"origin": "cross-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "https",
|
||||
"subresource": "iframe-tag",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/document.py",
|
||||
"referrer_url": "omitted"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -0,0 +1,40 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
|
||||
<meta name="description" content="Check that sub-resource never gets the referrer URL.">
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-no-referrer">
|
||||
<meta name="assert" content="The referrer URL is omitted when a
|
||||
document served over http requires an https
|
||||
sub-resource via img-tag using the attr-referrer
|
||||
delivery method with keep-origin-redirect and when
|
||||
the target request is cross-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "no-referrer",
|
||||
"delivery_method": "attr-referrer",
|
||||
"redirection": "keep-origin-redirect",
|
||||
"origin": "cross-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "https",
|
||||
"subresource": "img-tag",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/image.py",
|
||||
"referrer_url": "omitted"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -0,0 +1,40 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
|
||||
<meta name="description" content="Check that sub-resource never gets the referrer URL.">
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-no-referrer">
|
||||
<meta name="assert" content="The referrer URL is omitted when a
|
||||
document served over http requires an https
|
||||
sub-resource via img-tag using the attr-referrer
|
||||
delivery method with no-redirect and when
|
||||
the target request is cross-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "no-referrer",
|
||||
"delivery_method": "attr-referrer",
|
||||
"redirection": "no-redirect",
|
||||
"origin": "cross-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "https",
|
||||
"subresource": "img-tag",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/image.py",
|
||||
"referrer_url": "omitted"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -0,0 +1,40 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
|
||||
<meta name="description" content="Check that sub-resource never gets the referrer URL.">
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-no-referrer">
|
||||
<meta name="assert" content="The referrer URL is omitted when a
|
||||
document served over http requires an https
|
||||
sub-resource via img-tag using the attr-referrer
|
||||
delivery method with swap-origin-redirect and when
|
||||
the target request is cross-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "no-referrer",
|
||||
"delivery_method": "attr-referrer",
|
||||
"redirection": "swap-origin-redirect",
|
||||
"origin": "cross-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "https",
|
||||
"subresource": "img-tag",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/image.py",
|
||||
"referrer_url": "omitted"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -0,0 +1,40 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
|
||||
<meta name="description" content="Check that sub-resource never gets the referrer URL.">
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-no-referrer">
|
||||
<meta name="assert" content="The referrer URL is omitted when a
|
||||
document served over http requires an http
|
||||
sub-resource via iframe-tag using the attr-referrer
|
||||
delivery method with keep-origin-redirect and when
|
||||
the target request is same-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "no-referrer",
|
||||
"delivery_method": "attr-referrer",
|
||||
"redirection": "keep-origin-redirect",
|
||||
"origin": "same-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "http",
|
||||
"subresource": "iframe-tag",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/document.py",
|
||||
"referrer_url": "omitted"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -0,0 +1,40 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
|
||||
<meta name="description" content="Check that sub-resource never gets the referrer URL.">
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-no-referrer">
|
||||
<meta name="assert" content="The referrer URL is omitted when a
|
||||
document served over http requires an http
|
||||
sub-resource via iframe-tag using the attr-referrer
|
||||
delivery method with no-redirect and when
|
||||
the target request is same-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "no-referrer",
|
||||
"delivery_method": "attr-referrer",
|
||||
"redirection": "no-redirect",
|
||||
"origin": "same-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "http",
|
||||
"subresource": "iframe-tag",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/document.py",
|
||||
"referrer_url": "omitted"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -0,0 +1,40 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
|
||||
<meta name="description" content="Check that sub-resource never gets the referrer URL.">
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-no-referrer">
|
||||
<meta name="assert" content="The referrer URL is omitted when a
|
||||
document served over http requires an http
|
||||
sub-resource via iframe-tag using the attr-referrer
|
||||
delivery method with swap-origin-redirect and when
|
||||
the target request is same-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "no-referrer",
|
||||
"delivery_method": "attr-referrer",
|
||||
"redirection": "swap-origin-redirect",
|
||||
"origin": "same-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "http",
|
||||
"subresource": "iframe-tag",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/document.py",
|
||||
"referrer_url": "omitted"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -0,0 +1,40 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
|
||||
<meta name="description" content="Check that sub-resource never gets the referrer URL.">
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-no-referrer">
|
||||
<meta name="assert" content="The referrer URL is omitted when a
|
||||
document served over http requires an http
|
||||
sub-resource via img-tag using the attr-referrer
|
||||
delivery method with keep-origin-redirect and when
|
||||
the target request is same-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "no-referrer",
|
||||
"delivery_method": "attr-referrer",
|
||||
"redirection": "keep-origin-redirect",
|
||||
"origin": "same-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "http",
|
||||
"subresource": "img-tag",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/image.py",
|
||||
"referrer_url": "omitted"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -0,0 +1,40 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
|
||||
<meta name="description" content="Check that sub-resource never gets the referrer URL.">
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-no-referrer">
|
||||
<meta name="assert" content="The referrer URL is omitted when a
|
||||
document served over http requires an http
|
||||
sub-resource via img-tag using the attr-referrer
|
||||
delivery method with no-redirect and when
|
||||
the target request is same-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "no-referrer",
|
||||
"delivery_method": "attr-referrer",
|
||||
"redirection": "no-redirect",
|
||||
"origin": "same-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "http",
|
||||
"subresource": "img-tag",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/image.py",
|
||||
"referrer_url": "omitted"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -0,0 +1,40 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
|
||||
<meta name="description" content="Check that sub-resource never gets the referrer URL.">
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-no-referrer">
|
||||
<meta name="assert" content="The referrer URL is omitted when a
|
||||
document served over http requires an http
|
||||
sub-resource via img-tag using the attr-referrer
|
||||
delivery method with swap-origin-redirect and when
|
||||
the target request is same-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "no-referrer",
|
||||
"delivery_method": "attr-referrer",
|
||||
"redirection": "swap-origin-redirect",
|
||||
"origin": "same-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "http",
|
||||
"subresource": "img-tag",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/image.py",
|
||||
"referrer_url": "omitted"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -0,0 +1,40 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
|
||||
<meta name="description" content="Check that sub-resource never gets the referrer URL.">
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-no-referrer">
|
||||
<meta name="assert" content="The referrer URL is omitted when a
|
||||
document served over http requires an https
|
||||
sub-resource via iframe-tag using the attr-referrer
|
||||
delivery method with keep-origin-redirect and when
|
||||
the target request is same-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "no-referrer",
|
||||
"delivery_method": "attr-referrer",
|
||||
"redirection": "keep-origin-redirect",
|
||||
"origin": "same-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "https",
|
||||
"subresource": "iframe-tag",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/document.py",
|
||||
"referrer_url": "omitted"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -0,0 +1,40 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
|
||||
<meta name="description" content="Check that sub-resource never gets the referrer URL.">
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-no-referrer">
|
||||
<meta name="assert" content="The referrer URL is omitted when a
|
||||
document served over http requires an https
|
||||
sub-resource via iframe-tag using the attr-referrer
|
||||
delivery method with no-redirect and when
|
||||
the target request is same-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "no-referrer",
|
||||
"delivery_method": "attr-referrer",
|
||||
"redirection": "no-redirect",
|
||||
"origin": "same-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "https",
|
||||
"subresource": "iframe-tag",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/document.py",
|
||||
"referrer_url": "omitted"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -0,0 +1,40 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
|
||||
<meta name="description" content="Check that sub-resource never gets the referrer URL.">
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-no-referrer">
|
||||
<meta name="assert" content="The referrer URL is omitted when a
|
||||
document served over http requires an https
|
||||
sub-resource via iframe-tag using the attr-referrer
|
||||
delivery method with swap-origin-redirect and when
|
||||
the target request is same-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "no-referrer",
|
||||
"delivery_method": "attr-referrer",
|
||||
"redirection": "swap-origin-redirect",
|
||||
"origin": "same-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "https",
|
||||
"subresource": "iframe-tag",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/document.py",
|
||||
"referrer_url": "omitted"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -0,0 +1,40 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
|
||||
<meta name="description" content="Check that sub-resource never gets the referrer URL.">
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-no-referrer">
|
||||
<meta name="assert" content="The referrer URL is omitted when a
|
||||
document served over http requires an https
|
||||
sub-resource via img-tag using the attr-referrer
|
||||
delivery method with keep-origin-redirect and when
|
||||
the target request is same-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "no-referrer",
|
||||
"delivery_method": "attr-referrer",
|
||||
"redirection": "keep-origin-redirect",
|
||||
"origin": "same-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "https",
|
||||
"subresource": "img-tag",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/image.py",
|
||||
"referrer_url": "omitted"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -0,0 +1,40 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
|
||||
<meta name="description" content="Check that sub-resource never gets the referrer URL.">
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-no-referrer">
|
||||
<meta name="assert" content="The referrer URL is omitted when a
|
||||
document served over http requires an https
|
||||
sub-resource via img-tag using the attr-referrer
|
||||
delivery method with no-redirect and when
|
||||
the target request is same-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "no-referrer",
|
||||
"delivery_method": "attr-referrer",
|
||||
"redirection": "no-redirect",
|
||||
"origin": "same-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "https",
|
||||
"subresource": "img-tag",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/image.py",
|
||||
"referrer_url": "omitted"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -0,0 +1,40 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
|
||||
<meta name="description" content="Check that sub-resource never gets the referrer URL.">
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-no-referrer">
|
||||
<meta name="assert" content="The referrer URL is omitted when a
|
||||
document served over http requires an https
|
||||
sub-resource via img-tag using the attr-referrer
|
||||
delivery method with swap-origin-redirect and when
|
||||
the target request is same-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "no-referrer",
|
||||
"delivery_method": "attr-referrer",
|
||||
"redirection": "swap-origin-redirect",
|
||||
"origin": "same-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "https",
|
||||
"subresource": "img-tag",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/image.py",
|
||||
"referrer_url": "omitted"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -0,0 +1,40 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'origin-only'</title>
|
||||
<meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-origin">
|
||||
<meta name="assert" content="The referrer URL is origin when a
|
||||
document served over http requires an http
|
||||
sub-resource via iframe-tag using the attr-referrer
|
||||
delivery method with keep-origin-redirect and when
|
||||
the target request is cross-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "origin",
|
||||
"delivery_method": "attr-referrer",
|
||||
"redirection": "keep-origin-redirect",
|
||||
"origin": "cross-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "http",
|
||||
"subresource": "iframe-tag",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/document.py",
|
||||
"referrer_url": "origin"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -0,0 +1,40 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'origin-only'</title>
|
||||
<meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-origin">
|
||||
<meta name="assert" content="The referrer URL is origin when a
|
||||
document served over http requires an http
|
||||
sub-resource via iframe-tag using the attr-referrer
|
||||
delivery method with no-redirect and when
|
||||
the target request is cross-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "origin",
|
||||
"delivery_method": "attr-referrer",
|
||||
"redirection": "no-redirect",
|
||||
"origin": "cross-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "http",
|
||||
"subresource": "iframe-tag",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/document.py",
|
||||
"referrer_url": "origin"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -0,0 +1,40 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'origin-only'</title>
|
||||
<meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-origin">
|
||||
<meta name="assert" content="The referrer URL is origin when a
|
||||
document served over http requires an http
|
||||
sub-resource via iframe-tag using the attr-referrer
|
||||
delivery method with swap-origin-redirect and when
|
||||
the target request is cross-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "origin",
|
||||
"delivery_method": "attr-referrer",
|
||||
"redirection": "swap-origin-redirect",
|
||||
"origin": "cross-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "http",
|
||||
"subresource": "iframe-tag",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/document.py",
|
||||
"referrer_url": "origin"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -0,0 +1,40 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'origin-only'</title>
|
||||
<meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-origin">
|
||||
<meta name="assert" content="The referrer URL is origin when a
|
||||
document served over http requires an http
|
||||
sub-resource via img-tag using the attr-referrer
|
||||
delivery method with keep-origin-redirect and when
|
||||
the target request is cross-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "origin",
|
||||
"delivery_method": "attr-referrer",
|
||||
"redirection": "keep-origin-redirect",
|
||||
"origin": "cross-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "http",
|
||||
"subresource": "img-tag",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/image.py",
|
||||
"referrer_url": "origin"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -0,0 +1,40 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'origin-only'</title>
|
||||
<meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-origin">
|
||||
<meta name="assert" content="The referrer URL is origin when a
|
||||
document served over http requires an http
|
||||
sub-resource via img-tag using the attr-referrer
|
||||
delivery method with no-redirect and when
|
||||
the target request is cross-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "origin",
|
||||
"delivery_method": "attr-referrer",
|
||||
"redirection": "no-redirect",
|
||||
"origin": "cross-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "http",
|
||||
"subresource": "img-tag",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/image.py",
|
||||
"referrer_url": "origin"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
Some files were not shown because too many files have changed in this diff Show more
Loading…
Add table
Add a link
Reference in a new issue