mirror of
https://github.com/servo/servo.git
synced 2025-08-05 13:40:08 +01:00
Update web-platform-tests to revision 7ed49cff4d031720f829c01df837ed7a09ad5c60
This commit is contained in:
parent
33f0040496
commit
62a9bebeef
220 changed files with 8623 additions and 559 deletions
|
@ -801,6 +801,10 @@
|
||||||
"path": "html/semantics/grouping-content/the-li-element/grouping-li-novalue-manual.html",
|
"path": "html/semantics/grouping-content/the-li-element/grouping-li-novalue-manual.html",
|
||||||
"url": "/html/semantics/grouping-content/the-li-element/grouping-li-novalue-manual.html"
|
"url": "/html/semantics/grouping-content/the-li-element/grouping-li-novalue-manual.html"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"path": "html/semantics/selectors/pseudo-classes/checked-001-manual.html",
|
||||||
|
"url": "/html/semantics/selectors/pseudo-classes/checked-001-manual.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"path": "html/webappapis/scripting/event-loops/task_microtask_ordering-manual.html",
|
"path": "html/webappapis/scripting/event-loops/task_microtask_ordering-manual.html",
|
||||||
"url": "/html/webappapis/scripting/event-loops/task_microtask_ordering-manual.html"
|
"url": "/html/webappapis/scripting/event-loops/task_microtask_ordering-manual.html"
|
||||||
|
@ -12159,6 +12163,10 @@
|
||||||
"path": "WebIDL/ecmascript-binding/es-exceptions/exceptions.html",
|
"path": "WebIDL/ecmascript-binding/es-exceptions/exceptions.html",
|
||||||
"url": "/WebIDL/ecmascript-binding/es-exceptions/exceptions.html"
|
"url": "/WebIDL/ecmascript-binding/es-exceptions/exceptions.html"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"path": "WebIDL/ecmascript-binding/has-instance.html",
|
||||||
|
"url": "/WebIDL/ecmascript-binding/has-instance.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"path": "XMLHttpRequest/FormData-append.html",
|
"path": "XMLHttpRequest/FormData-append.html",
|
||||||
"url": "/XMLHttpRequest/FormData-append.html"
|
"url": "/XMLHttpRequest/FormData-append.html"
|
||||||
|
@ -12547,6 +12555,10 @@
|
||||||
"path": "XMLHttpRequest/responsexml-document-properties.htm",
|
"path": "XMLHttpRequest/responsexml-document-properties.htm",
|
||||||
"url": "/XMLHttpRequest/responsexml-document-properties.htm"
|
"url": "/XMLHttpRequest/responsexml-document-properties.htm"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"path": "XMLHttpRequest/responsexml-get-twice.htm",
|
||||||
|
"url": "/XMLHttpRequest/responsexml-get-twice.htm"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"path": "XMLHttpRequest/responsexml-media-type.htm",
|
"path": "XMLHttpRequest/responsexml-media-type.htm",
|
||||||
"url": "/XMLHttpRequest/responsexml-media-type.htm"
|
"url": "/XMLHttpRequest/responsexml-media-type.htm"
|
||||||
|
@ -13535,6 +13547,30 @@
|
||||||
"path": "content-security-policy/svg/svg-policy-with-resource.html",
|
"path": "content-security-policy/svg/svg-policy-with-resource.html",
|
||||||
"url": "/content-security-policy/svg/svg-policy-with-resource.html"
|
"url": "/content-security-policy/svg/svg-policy-with-resource.html"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"path": "cookies/secure/set-from-dom.https.sub.html",
|
||||||
|
"url": "/cookies/secure/set-from-dom.https.sub.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "cookies/secure/set-from-dom.sub.html",
|
||||||
|
"url": "/cookies/secure/set-from-dom.sub.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "cookies/secure/set-from-http.https.sub.html",
|
||||||
|
"url": "/cookies/secure/set-from-http.https.sub.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "cookies/secure/set-from-http.sub.html",
|
||||||
|
"url": "/cookies/secure/set-from-http.sub.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "cookies/secure/set-from-ws.https.sub.html",
|
||||||
|
"url": "/cookies/secure/set-from-ws.https.sub.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "cookies/secure/set-from-wss.https.sub.html",
|
||||||
|
"url": "/cookies/secure/set-from-wss.https.sub.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"path": "cors/allow-headers.htm",
|
"path": "cors/allow-headers.htm",
|
||||||
"url": "/cors/allow-headers.htm"
|
"url": "/cors/allow-headers.htm"
|
||||||
|
@ -18543,6 +18579,10 @@
|
||||||
"path": "html/semantics/embedded-content/the-img-element/srcset/select-an-image-source.html",
|
"path": "html/semantics/embedded-content/the-img-element/srcset/select-an-image-source.html",
|
||||||
"url": "/html/semantics/embedded-content/the-img-element/srcset/select-an-image-source.html"
|
"url": "/html/semantics/embedded-content/the-img-element/srcset/select-an-image-source.html"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"path": "html/semantics/embedded-content/the-img-element/update-media.html",
|
||||||
|
"url": "/html/semantics/embedded-content/the-img-element/update-media.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"path": "html/semantics/embedded-content/the-img-element/update-the-image-data/fail-to-resolve.html",
|
"path": "html/semantics/embedded-content/the-img-element/update-the-image-data/fail-to-resolve.html",
|
||||||
"url": "/html/semantics/embedded-content/the-img-element/update-the-image-data/fail-to-resolve.html"
|
"url": "/html/semantics/embedded-content/the-img-element/update-the-image-data/fail-to-resolve.html"
|
||||||
|
@ -19235,6 +19275,10 @@
|
||||||
"path": "html/semantics/selectors/pseudo-classes/focus.html",
|
"path": "html/semantics/selectors/pseudo-classes/focus.html",
|
||||||
"url": "/html/semantics/selectors/pseudo-classes/focus.html"
|
"url": "/html/semantics/selectors/pseudo-classes/focus.html"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"path": "html/semantics/selectors/pseudo-classes/indeterminate-radio.html",
|
||||||
|
"url": "/html/semantics/selectors/pseudo-classes/indeterminate-radio.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"path": "html/semantics/selectors/pseudo-classes/indeterminate.html",
|
"path": "html/semantics/selectors/pseudo-classes/indeterminate.html",
|
||||||
"url": "/html/semantics/selectors/pseudo-classes/indeterminate.html"
|
"url": "/html/semantics/selectors/pseudo-classes/indeterminate.html"
|
||||||
|
@ -22035,6 +22079,14 @@
|
||||||
"path": "pointerlock/idlharness.html",
|
"path": "pointerlock/idlharness.html",
|
||||||
"url": "/pointerlock/idlharness.html"
|
"url": "/pointerlock/idlharness.html"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"path": "presentation-api/controlling-ua/idlharness.html",
|
||||||
|
"url": "/presentation-api/controlling-ua/idlharness.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "presentation-api/receiving-ua/idlharness.html",
|
||||||
|
"url": "/presentation-api/receiving-ua/idlharness.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"path": "progress-events/constructor.html",
|
"path": "progress-events/constructor.html",
|
||||||
"url": "/progress-events/constructor.html"
|
"url": "/progress-events/constructor.html"
|
||||||
|
@ -22095,6 +22147,10 @@
|
||||||
"path": "referrer-policy/generic/subresource-test/area-navigate.html",
|
"path": "referrer-policy/generic/subresource-test/area-navigate.html",
|
||||||
"url": "/referrer-policy/generic/subresource-test/area-navigate.html"
|
"url": "/referrer-policy/generic/subresource-test/area-navigate.html"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/generic/subresource-test/attr-referrer-invalid-value.html",
|
||||||
|
"url": "/referrer-policy/generic/subresource-test/attr-referrer-invalid-value.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"path": "referrer-policy/generic/subresource-test/fetch-messaging.html",
|
"path": "referrer-policy/generic/subresource-test/fetch-messaging.html",
|
||||||
"url": "/referrer-policy/generic/subresource-test/fetch-messaging.html"
|
"url": "/referrer-policy/generic/subresource-test/fetch-messaging.html"
|
||||||
|
@ -22123,6 +22179,102 @@
|
||||||
"path": "referrer-policy/generic/subresource-test/xhr-messaging.html",
|
"path": "referrer-policy/generic/subresource-test/xhr-messaging.html",
|
||||||
"url": "/referrer-policy/generic/subresource-test/xhr-messaging.html"
|
"url": "/referrer-policy/generic/subresource-test/xhr-messaging.html"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-http/iframe-tag/insecure-protocol.keep-origin-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-http/iframe-tag/insecure-protocol.keep-origin-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-http/iframe-tag/insecure-protocol.no-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-http/iframe-tag/insecure-protocol.no-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-http/iframe-tag/insecure-protocol.swap-origin-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-http/iframe-tag/insecure-protocol.swap-origin-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-http/img-tag/insecure-protocol.keep-origin-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-http/img-tag/insecure-protocol.keep-origin-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-http/img-tag/insecure-protocol.no-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-http/img-tag/insecure-protocol.no-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-http/img-tag/insecure-protocol.swap-origin-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-http/img-tag/insecure-protocol.swap-origin-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-https/iframe-tag/upgrade-protocol.keep-origin-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-https/iframe-tag/upgrade-protocol.keep-origin-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-https/iframe-tag/upgrade-protocol.no-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-https/iframe-tag/upgrade-protocol.no-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-https/iframe-tag/upgrade-protocol.swap-origin-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-https/iframe-tag/upgrade-protocol.swap-origin-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-https/img-tag/upgrade-protocol.keep-origin-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-https/img-tag/upgrade-protocol.keep-origin-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-https/img-tag/upgrade-protocol.no-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-https/img-tag/upgrade-protocol.no-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-https/img-tag/upgrade-protocol.swap-origin-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-https/img-tag/upgrade-protocol.swap-origin-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-http/iframe-tag/insecure-protocol.keep-origin-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-http/iframe-tag/insecure-protocol.keep-origin-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-http/iframe-tag/insecure-protocol.no-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-http/iframe-tag/insecure-protocol.no-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-http/iframe-tag/insecure-protocol.swap-origin-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-http/iframe-tag/insecure-protocol.swap-origin-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-http/img-tag/insecure-protocol.keep-origin-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-http/img-tag/insecure-protocol.keep-origin-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-http/img-tag/insecure-protocol.no-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-http/img-tag/insecure-protocol.no-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-http/img-tag/insecure-protocol.swap-origin-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-http/img-tag/insecure-protocol.swap-origin-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-https/iframe-tag/upgrade-protocol.keep-origin-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-https/iframe-tag/upgrade-protocol.keep-origin-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-https/iframe-tag/upgrade-protocol.no-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-https/iframe-tag/upgrade-protocol.no-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-https/iframe-tag/upgrade-protocol.swap-origin-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-https/iframe-tag/upgrade-protocol.swap-origin-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-https/img-tag/upgrade-protocol.keep-origin-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-https/img-tag/upgrade-protocol.keep-origin-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-https/img-tag/upgrade-protocol.no-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-https/img-tag/upgrade-protocol.no-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-https/img-tag/upgrade-protocol.swap-origin-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-https/img-tag/upgrade-protocol.swap-origin-redirect.http.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"path": "referrer-policy/no-referrer-when-downgrade/http-csp/cross-origin/http-http/fetch-request/insecure-protocol.keep-origin-redirect.http.html",
|
"path": "referrer-policy/no-referrer-when-downgrade/http-csp/cross-origin/http-http/fetch-request/insecure-protocol.keep-origin-redirect.http.html",
|
||||||
"url": "/referrer-policy/no-referrer-when-downgrade/http-csp/cross-origin/http-http/fetch-request/insecure-protocol.keep-origin-redirect.http.html"
|
"url": "/referrer-policy/no-referrer-when-downgrade/http-csp/cross-origin/http-http/fetch-request/insecure-protocol.keep-origin-redirect.http.html"
|
||||||
|
@ -22843,6 +22995,102 @@
|
||||||
"path": "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/xhr-request/upgrade-protocol.swap-origin-redirect.http.html",
|
"path": "referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/xhr-request/upgrade-protocol.swap-origin-redirect.http.html",
|
||||||
"url": "/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/xhr-request/upgrade-protocol.swap-origin-redirect.http.html"
|
"url": "/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/xhr-request/upgrade-protocol.swap-origin-redirect.http.html"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/no-referrer/attr-referrer/cross-origin/http-http/iframe-tag/generic.keep-origin-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/no-referrer/attr-referrer/cross-origin/http-http/iframe-tag/generic.keep-origin-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/no-referrer/attr-referrer/cross-origin/http-http/iframe-tag/generic.no-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/no-referrer/attr-referrer/cross-origin/http-http/iframe-tag/generic.no-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/no-referrer/attr-referrer/cross-origin/http-http/iframe-tag/generic.swap-origin-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/no-referrer/attr-referrer/cross-origin/http-http/iframe-tag/generic.swap-origin-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/no-referrer/attr-referrer/cross-origin/http-http/img-tag/generic.keep-origin-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/no-referrer/attr-referrer/cross-origin/http-http/img-tag/generic.keep-origin-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/no-referrer/attr-referrer/cross-origin/http-http/img-tag/generic.no-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/no-referrer/attr-referrer/cross-origin/http-http/img-tag/generic.no-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/no-referrer/attr-referrer/cross-origin/http-http/img-tag/generic.swap-origin-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/no-referrer/attr-referrer/cross-origin/http-http/img-tag/generic.swap-origin-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/no-referrer/attr-referrer/cross-origin/http-https/iframe-tag/generic.keep-origin-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/no-referrer/attr-referrer/cross-origin/http-https/iframe-tag/generic.keep-origin-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/no-referrer/attr-referrer/cross-origin/http-https/iframe-tag/generic.no-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/no-referrer/attr-referrer/cross-origin/http-https/iframe-tag/generic.no-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/no-referrer/attr-referrer/cross-origin/http-https/iframe-tag/generic.swap-origin-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/no-referrer/attr-referrer/cross-origin/http-https/iframe-tag/generic.swap-origin-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/no-referrer/attr-referrer/cross-origin/http-https/img-tag/generic.keep-origin-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/no-referrer/attr-referrer/cross-origin/http-https/img-tag/generic.keep-origin-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/no-referrer/attr-referrer/cross-origin/http-https/img-tag/generic.no-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/no-referrer/attr-referrer/cross-origin/http-https/img-tag/generic.no-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/no-referrer/attr-referrer/cross-origin/http-https/img-tag/generic.swap-origin-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/no-referrer/attr-referrer/cross-origin/http-https/img-tag/generic.swap-origin-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/no-referrer/attr-referrer/same-origin/http-http/iframe-tag/generic.keep-origin-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/no-referrer/attr-referrer/same-origin/http-http/iframe-tag/generic.keep-origin-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/no-referrer/attr-referrer/same-origin/http-http/iframe-tag/generic.no-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/no-referrer/attr-referrer/same-origin/http-http/iframe-tag/generic.no-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/no-referrer/attr-referrer/same-origin/http-http/iframe-tag/generic.swap-origin-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/no-referrer/attr-referrer/same-origin/http-http/iframe-tag/generic.swap-origin-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/no-referrer/attr-referrer/same-origin/http-http/img-tag/generic.keep-origin-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/no-referrer/attr-referrer/same-origin/http-http/img-tag/generic.keep-origin-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/no-referrer/attr-referrer/same-origin/http-http/img-tag/generic.no-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/no-referrer/attr-referrer/same-origin/http-http/img-tag/generic.no-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/no-referrer/attr-referrer/same-origin/http-http/img-tag/generic.swap-origin-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/no-referrer/attr-referrer/same-origin/http-http/img-tag/generic.swap-origin-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/no-referrer/attr-referrer/same-origin/http-https/iframe-tag/generic.keep-origin-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/no-referrer/attr-referrer/same-origin/http-https/iframe-tag/generic.keep-origin-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/no-referrer/attr-referrer/same-origin/http-https/iframe-tag/generic.no-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/no-referrer/attr-referrer/same-origin/http-https/iframe-tag/generic.no-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/no-referrer/attr-referrer/same-origin/http-https/iframe-tag/generic.swap-origin-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/no-referrer/attr-referrer/same-origin/http-https/iframe-tag/generic.swap-origin-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/no-referrer/attr-referrer/same-origin/http-https/img-tag/generic.keep-origin-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/no-referrer/attr-referrer/same-origin/http-https/img-tag/generic.keep-origin-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/no-referrer/attr-referrer/same-origin/http-https/img-tag/generic.no-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/no-referrer/attr-referrer/same-origin/http-https/img-tag/generic.no-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/no-referrer/attr-referrer/same-origin/http-https/img-tag/generic.swap-origin-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/no-referrer/attr-referrer/same-origin/http-https/img-tag/generic.swap-origin-redirect.http.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"path": "referrer-policy/no-referrer/http-csp/cross-origin/http-http/fetch-request/generic.keep-origin-redirect.http.html",
|
"path": "referrer-policy/no-referrer/http-csp/cross-origin/http-http/fetch-request/generic.keep-origin-redirect.http.html",
|
||||||
"url": "/referrer-policy/no-referrer/http-csp/cross-origin/http-http/fetch-request/generic.keep-origin-redirect.http.html"
|
"url": "/referrer-policy/no-referrer/http-csp/cross-origin/http-http/fetch-request/generic.keep-origin-redirect.http.html"
|
||||||
|
@ -23563,6 +23811,102 @@
|
||||||
"path": "referrer-policy/no-referrer/meta-referrer/same-origin/http-https/xhr-request/generic.swap-origin-redirect.http.html",
|
"path": "referrer-policy/no-referrer/meta-referrer/same-origin/http-https/xhr-request/generic.swap-origin-redirect.http.html",
|
||||||
"url": "/referrer-policy/no-referrer/meta-referrer/same-origin/http-https/xhr-request/generic.swap-origin-redirect.http.html"
|
"url": "/referrer-policy/no-referrer/meta-referrer/same-origin/http-https/xhr-request/generic.swap-origin-redirect.http.html"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/origin-only/attr-referrer/cross-origin/http-http/iframe-tag/generic.keep-origin-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/origin-only/attr-referrer/cross-origin/http-http/iframe-tag/generic.keep-origin-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/origin-only/attr-referrer/cross-origin/http-http/iframe-tag/generic.no-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/origin-only/attr-referrer/cross-origin/http-http/iframe-tag/generic.no-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/origin-only/attr-referrer/cross-origin/http-http/iframe-tag/generic.swap-origin-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/origin-only/attr-referrer/cross-origin/http-http/iframe-tag/generic.swap-origin-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/origin-only/attr-referrer/cross-origin/http-http/img-tag/generic.keep-origin-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/origin-only/attr-referrer/cross-origin/http-http/img-tag/generic.keep-origin-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/origin-only/attr-referrer/cross-origin/http-http/img-tag/generic.no-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/origin-only/attr-referrer/cross-origin/http-http/img-tag/generic.no-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/origin-only/attr-referrer/cross-origin/http-http/img-tag/generic.swap-origin-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/origin-only/attr-referrer/cross-origin/http-http/img-tag/generic.swap-origin-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/origin-only/attr-referrer/cross-origin/http-https/iframe-tag/generic.keep-origin-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/origin-only/attr-referrer/cross-origin/http-https/iframe-tag/generic.keep-origin-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/origin-only/attr-referrer/cross-origin/http-https/iframe-tag/generic.no-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/origin-only/attr-referrer/cross-origin/http-https/iframe-tag/generic.no-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/origin-only/attr-referrer/cross-origin/http-https/iframe-tag/generic.swap-origin-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/origin-only/attr-referrer/cross-origin/http-https/iframe-tag/generic.swap-origin-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/origin-only/attr-referrer/cross-origin/http-https/img-tag/generic.keep-origin-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/origin-only/attr-referrer/cross-origin/http-https/img-tag/generic.keep-origin-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/origin-only/attr-referrer/cross-origin/http-https/img-tag/generic.no-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/origin-only/attr-referrer/cross-origin/http-https/img-tag/generic.no-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/origin-only/attr-referrer/cross-origin/http-https/img-tag/generic.swap-origin-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/origin-only/attr-referrer/cross-origin/http-https/img-tag/generic.swap-origin-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/origin-only/attr-referrer/same-origin/http-http/iframe-tag/generic.keep-origin-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/origin-only/attr-referrer/same-origin/http-http/iframe-tag/generic.keep-origin-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/origin-only/attr-referrer/same-origin/http-http/iframe-tag/generic.no-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/origin-only/attr-referrer/same-origin/http-http/iframe-tag/generic.no-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/origin-only/attr-referrer/same-origin/http-http/iframe-tag/generic.swap-origin-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/origin-only/attr-referrer/same-origin/http-http/iframe-tag/generic.swap-origin-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/origin-only/attr-referrer/same-origin/http-http/img-tag/generic.keep-origin-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/origin-only/attr-referrer/same-origin/http-http/img-tag/generic.keep-origin-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/origin-only/attr-referrer/same-origin/http-http/img-tag/generic.no-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/origin-only/attr-referrer/same-origin/http-http/img-tag/generic.no-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/origin-only/attr-referrer/same-origin/http-http/img-tag/generic.swap-origin-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/origin-only/attr-referrer/same-origin/http-http/img-tag/generic.swap-origin-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/origin-only/attr-referrer/same-origin/http-https/iframe-tag/generic.keep-origin-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/origin-only/attr-referrer/same-origin/http-https/iframe-tag/generic.keep-origin-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/origin-only/attr-referrer/same-origin/http-https/iframe-tag/generic.no-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/origin-only/attr-referrer/same-origin/http-https/iframe-tag/generic.no-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/origin-only/attr-referrer/same-origin/http-https/iframe-tag/generic.swap-origin-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/origin-only/attr-referrer/same-origin/http-https/iframe-tag/generic.swap-origin-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/origin-only/attr-referrer/same-origin/http-https/img-tag/generic.keep-origin-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/origin-only/attr-referrer/same-origin/http-https/img-tag/generic.keep-origin-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/origin-only/attr-referrer/same-origin/http-https/img-tag/generic.no-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/origin-only/attr-referrer/same-origin/http-https/img-tag/generic.no-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/origin-only/attr-referrer/same-origin/http-https/img-tag/generic.swap-origin-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/origin-only/attr-referrer/same-origin/http-https/img-tag/generic.swap-origin-redirect.http.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"path": "referrer-policy/origin-only/http-csp/cross-origin/http-http/fetch-request/generic.keep-origin-redirect.http.html",
|
"path": "referrer-policy/origin-only/http-csp/cross-origin/http-http/fetch-request/generic.keep-origin-redirect.http.html",
|
||||||
"url": "/referrer-policy/origin-only/http-csp/cross-origin/http-http/fetch-request/generic.keep-origin-redirect.http.html"
|
"url": "/referrer-policy/origin-only/http-csp/cross-origin/http-http/fetch-request/generic.keep-origin-redirect.http.html"
|
||||||
|
@ -24283,6 +24627,134 @@
|
||||||
"path": "referrer-policy/origin-only/meta-referrer/same-origin/http-https/xhr-request/generic.swap-origin-redirect.http.html",
|
"path": "referrer-policy/origin-only/meta-referrer/same-origin/http-https/xhr-request/generic.swap-origin-redirect.http.html",
|
||||||
"url": "/referrer-policy/origin-only/meta-referrer/same-origin/http-https/xhr-request/generic.swap-origin-redirect.http.html"
|
"url": "/referrer-policy/origin-only/meta-referrer/same-origin/http-https/xhr-request/generic.swap-origin-redirect.http.html"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-http/iframe-tag/cross-origin.keep-origin-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-http/iframe-tag/cross-origin.keep-origin-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-http/iframe-tag/cross-origin.no-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-http/iframe-tag/cross-origin.no-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-http/iframe-tag/cross-origin.swap-origin-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-http/iframe-tag/cross-origin.swap-origin-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-http/img-tag/cross-origin.keep-origin-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-http/img-tag/cross-origin.keep-origin-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-http/img-tag/cross-origin.no-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-http/img-tag/cross-origin.no-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-http/img-tag/cross-origin.swap-origin-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-http/img-tag/cross-origin.swap-origin-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-https/iframe-tag/cross-origin.keep-origin-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-https/iframe-tag/cross-origin.keep-origin-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-https/iframe-tag/cross-origin.no-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-https/iframe-tag/cross-origin.no-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-https/iframe-tag/cross-origin.swap-origin-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-https/iframe-tag/cross-origin.swap-origin-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-https/img-tag/cross-origin.keep-origin-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-https/img-tag/cross-origin.keep-origin-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-https/img-tag/cross-origin.no-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-https/img-tag/cross-origin.no-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-https/img-tag/cross-origin.swap-origin-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-https/img-tag/cross-origin.swap-origin-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-http/iframe-tag/same-origin-insecure.keep-origin-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-http/iframe-tag/same-origin-insecure.keep-origin-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-http/iframe-tag/same-origin-insecure.no-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-http/iframe-tag/same-origin-insecure.no-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-http/iframe-tag/same-origin-insecure.swap-origin-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-http/iframe-tag/same-origin-insecure.swap-origin-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-http/img-tag/same-origin-insecure.keep-origin-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-http/img-tag/same-origin-insecure.keep-origin-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-http/img-tag/same-origin-insecure.no-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-http/img-tag/same-origin-insecure.no-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-http/img-tag/same-origin-insecure.swap-origin-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-http/img-tag/same-origin-insecure.swap-origin-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/same-origin-downgrade.keep-origin-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/same-origin-downgrade.keep-origin-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/same-origin-downgrade.no-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/same-origin-downgrade.no-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/same-origin-downgrade.swap-origin-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/same-origin-downgrade.swap-origin-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/same-origin-insecure.swap-origin-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/same-origin-insecure.swap-origin-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/same-origin-upgrade.keep-origin-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/same-origin-upgrade.keep-origin-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/same-origin-upgrade.no-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/same-origin-upgrade.no-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/same-origin-upgrade.swap-origin-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/same-origin-upgrade.swap-origin-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/same-origin-downgrade.keep-origin-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/same-origin-downgrade.keep-origin-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/same-origin-downgrade.no-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/same-origin-downgrade.no-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/same-origin-downgrade.swap-origin-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/same-origin-downgrade.swap-origin-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/same-origin-insecure.swap-origin-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/same-origin-insecure.swap-origin-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/same-origin-upgrade.keep-origin-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/same-origin-upgrade.keep-origin-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/same-origin-upgrade.no-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/same-origin-upgrade.no-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/same-origin-upgrade.swap-origin-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/same-origin-upgrade.swap-origin-redirect.http.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"path": "referrer-policy/origin-when-cross-origin/http-csp/cross-origin/http-http/fetch-request/cross-origin.keep-origin-redirect.http.html",
|
"path": "referrer-policy/origin-when-cross-origin/http-csp/cross-origin/http-http/fetch-request/cross-origin.keep-origin-redirect.http.html",
|
||||||
"url": "/referrer-policy/origin-when-cross-origin/http-csp/cross-origin/http-http/fetch-request/cross-origin.keep-origin-redirect.http.html"
|
"url": "/referrer-policy/origin-when-cross-origin/http-csp/cross-origin/http-http/fetch-request/cross-origin.keep-origin-redirect.http.html"
|
||||||
|
@ -25243,6 +25715,102 @@
|
||||||
"path": "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/same-origin-upgrade.swap-origin-redirect.http.html",
|
"path": "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/same-origin-upgrade.swap-origin-redirect.http.html",
|
||||||
"url": "/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/same-origin-upgrade.swap-origin-redirect.http.html"
|
"url": "/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/same-origin-upgrade.swap-origin-redirect.http.html"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/iframe-tag/generic.keep-origin-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/iframe-tag/generic.keep-origin-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/iframe-tag/generic.no-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/iframe-tag/generic.no-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/iframe-tag/generic.swap-origin-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/iframe-tag/generic.swap-origin-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/img-tag/generic.keep-origin-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/img-tag/generic.keep-origin-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/img-tag/generic.no-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/img-tag/generic.no-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/img-tag/generic.swap-origin-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/img-tag/generic.swap-origin-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/iframe-tag/generic.keep-origin-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/iframe-tag/generic.keep-origin-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/iframe-tag/generic.no-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/iframe-tag/generic.no-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/iframe-tag/generic.swap-origin-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/iframe-tag/generic.swap-origin-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/img-tag/generic.keep-origin-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/img-tag/generic.keep-origin-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/img-tag/generic.no-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/img-tag/generic.no-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/img-tag/generic.swap-origin-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/img-tag/generic.swap-origin-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/iframe-tag/generic.keep-origin-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/iframe-tag/generic.keep-origin-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/iframe-tag/generic.no-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/iframe-tag/generic.no-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/iframe-tag/generic.swap-origin-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/iframe-tag/generic.swap-origin-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/img-tag/generic.keep-origin-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/img-tag/generic.keep-origin-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/img-tag/generic.no-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/img-tag/generic.no-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/img-tag/generic.swap-origin-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/img-tag/generic.swap-origin-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/iframe-tag/generic.keep-origin-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/iframe-tag/generic.keep-origin-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/iframe-tag/generic.no-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/iframe-tag/generic.no-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/iframe-tag/generic.swap-origin-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/iframe-tag/generic.swap-origin-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/img-tag/generic.keep-origin-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/img-tag/generic.keep-origin-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/img-tag/generic.no-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/img-tag/generic.no-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/img-tag/generic.swap-origin-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/img-tag/generic.swap-origin-redirect.http.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"path": "referrer-policy/unsafe-url/http-csp/cross-origin/http-http/fetch-request/generic.keep-origin-redirect.http.html",
|
"path": "referrer-policy/unsafe-url/http-csp/cross-origin/http-http/fetch-request/generic.keep-origin-redirect.http.html",
|
||||||
"url": "/referrer-policy/unsafe-url/http-csp/cross-origin/http-http/fetch-request/generic.keep-origin-redirect.http.html"
|
"url": "/referrer-policy/unsafe-url/http-csp/cross-origin/http-http/fetch-request/generic.keep-origin-redirect.http.html"
|
||||||
|
@ -25963,6 +26531,102 @@
|
||||||
"path": "referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/xhr-request/generic.swap-origin-redirect.http.html",
|
"path": "referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/xhr-request/generic.swap-origin-redirect.http.html",
|
||||||
"url": "/referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/xhr-request/generic.swap-origin-redirect.http.html"
|
"url": "/referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/xhr-request/generic.swap-origin-redirect.http.html"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-http/iframe-tag/generic.keep-origin-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-http/iframe-tag/generic.keep-origin-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-http/iframe-tag/generic.no-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-http/iframe-tag/generic.no-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-http/iframe-tag/generic.swap-origin-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-http/iframe-tag/generic.swap-origin-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-http/img-tag/generic.keep-origin-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-http/img-tag/generic.keep-origin-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-http/img-tag/generic.no-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-http/img-tag/generic.no-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-http/img-tag/generic.swap-origin-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-http/img-tag/generic.swap-origin-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-https/iframe-tag/generic.keep-origin-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-https/iframe-tag/generic.keep-origin-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-https/iframe-tag/generic.no-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-https/iframe-tag/generic.no-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-https/iframe-tag/generic.swap-origin-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-https/iframe-tag/generic.swap-origin-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-https/img-tag/generic.keep-origin-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-https/img-tag/generic.keep-origin-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-https/img-tag/generic.no-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-https/img-tag/generic.no-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-https/img-tag/generic.swap-origin-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-https/img-tag/generic.swap-origin-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-http/iframe-tag/generic.keep-origin-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-http/iframe-tag/generic.keep-origin-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-http/iframe-tag/generic.no-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-http/iframe-tag/generic.no-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-http/iframe-tag/generic.swap-origin-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-http/iframe-tag/generic.swap-origin-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-http/img-tag/generic.keep-origin-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-http/img-tag/generic.keep-origin-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-http/img-tag/generic.no-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-http/img-tag/generic.no-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-http/img-tag/generic.swap-origin-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-http/img-tag/generic.swap-origin-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-https/iframe-tag/generic.keep-origin-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-https/iframe-tag/generic.keep-origin-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-https/iframe-tag/generic.no-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-https/iframe-tag/generic.no-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-https/iframe-tag/generic.swap-origin-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-https/iframe-tag/generic.swap-origin-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-https/img-tag/generic.keep-origin-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-https/img-tag/generic.keep-origin-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-https/img-tag/generic.no-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-https/img-tag/generic.no-redirect.http.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-https/img-tag/generic.swap-origin-redirect.http.html",
|
||||||
|
"url": "/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-https/img-tag/generic.swap-origin-redirect.http.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"path": "referrer-policy/unset-referrer-policy/http-csp/cross-origin/http-http/fetch-request/generic.keep-origin-redirect.http.html",
|
"path": "referrer-policy/unset-referrer-policy/http-csp/cross-origin/http-http/fetch-request/generic.keep-origin-redirect.http.html",
|
||||||
"url": "/referrer-policy/unset-referrer-policy/http-csp/cross-origin/http-http/fetch-request/generic.keep-origin-redirect.http.html"
|
"url": "/referrer-policy/unset-referrer-policy/http-csp/cross-origin/http-http/fetch-request/generic.keep-origin-redirect.http.html"
|
||||||
|
@ -26948,40 +27612,40 @@
|
||||||
"url": "/shadow-dom/untriaged/events/event-retargeting/test-004.html"
|
"url": "/shadow-dom/untriaged/events/event-retargeting/test-004.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"path": "shadow-dom/untriaged/events/events-that-are-always-stopped/test-001.html",
|
"path": "shadow-dom/untriaged/events/events-created-by-users-do-not-stop/test-001.html",
|
||||||
"url": "/shadow-dom/untriaged/events/events-that-are-always-stopped/test-001.html"
|
"url": "/shadow-dom/untriaged/events/events-created-by-users-do-not-stop/test-001.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"path": "shadow-dom/untriaged/events/events-that-are-always-stopped/test-002.html",
|
"path": "shadow-dom/untriaged/events/events-created-by-users-do-not-stop/test-002.html",
|
||||||
"url": "/shadow-dom/untriaged/events/events-that-are-always-stopped/test-002.html"
|
"url": "/shadow-dom/untriaged/events/events-created-by-users-do-not-stop/test-002.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"path": "shadow-dom/untriaged/events/events-that-are-always-stopped/test-003.html",
|
"path": "shadow-dom/untriaged/events/events-created-by-users-do-not-stop/test-003.html",
|
||||||
"url": "/shadow-dom/untriaged/events/events-that-are-always-stopped/test-003.html"
|
"url": "/shadow-dom/untriaged/events/events-created-by-users-do-not-stop/test-003.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"path": "shadow-dom/untriaged/events/events-that-are-always-stopped/test-004.html",
|
"path": "shadow-dom/untriaged/events/events-created-by-users-do-not-stop/test-004.html",
|
||||||
"url": "/shadow-dom/untriaged/events/events-that-are-always-stopped/test-004.html"
|
"url": "/shadow-dom/untriaged/events/events-created-by-users-do-not-stop/test-004.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"path": "shadow-dom/untriaged/events/events-that-are-always-stopped/test-005.html",
|
"path": "shadow-dom/untriaged/events/events-created-by-users-do-not-stop/test-005.html",
|
||||||
"url": "/shadow-dom/untriaged/events/events-that-are-always-stopped/test-005.html"
|
"url": "/shadow-dom/untriaged/events/events-created-by-users-do-not-stop/test-005.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"path": "shadow-dom/untriaged/events/events-that-are-always-stopped/test-006.html",
|
"path": "shadow-dom/untriaged/events/events-created-by-users-do-not-stop/test-006.html",
|
||||||
"url": "/shadow-dom/untriaged/events/events-that-are-always-stopped/test-006.html"
|
"url": "/shadow-dom/untriaged/events/events-created-by-users-do-not-stop/test-006.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"path": "shadow-dom/untriaged/events/events-that-are-always-stopped/test-007.html",
|
"path": "shadow-dom/untriaged/events/events-created-by-users-do-not-stop/test-007.html",
|
||||||
"url": "/shadow-dom/untriaged/events/events-that-are-always-stopped/test-007.html"
|
"url": "/shadow-dom/untriaged/events/events-created-by-users-do-not-stop/test-007.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"path": "shadow-dom/untriaged/events/events-that-are-always-stopped/test-008.html",
|
"path": "shadow-dom/untriaged/events/events-created-by-users-do-not-stop/test-008.html",
|
||||||
"url": "/shadow-dom/untriaged/events/events-that-are-always-stopped/test-008.html"
|
"url": "/shadow-dom/untriaged/events/events-created-by-users-do-not-stop/test-008.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"path": "shadow-dom/untriaged/events/events-that-are-always-stopped/test-009.html",
|
"path": "shadow-dom/untriaged/events/events-created-by-users-do-not-stop/test-009.html",
|
||||||
"url": "/shadow-dom/untriaged/events/events-that-are-always-stopped/test-009.html"
|
"url": "/shadow-dom/untriaged/events/events-created-by-users-do-not-stop/test-009.html"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"path": "shadow-dom/untriaged/events/retargeting-focus-events/test-001.html",
|
"path": "shadow-dom/untriaged/events/retargeting-focus-events/test-001.html",
|
||||||
|
@ -27503,6 +28167,10 @@
|
||||||
"path": "web-animations/keyframe-effect/constructor.html",
|
"path": "web-animations/keyframe-effect/constructor.html",
|
||||||
"url": "/web-animations/keyframe-effect/constructor.html"
|
"url": "/web-animations/keyframe-effect/constructor.html"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"path": "web-animations/keyframe-effect/effect-easing.html",
|
||||||
|
"url": "/web-animations/keyframe-effect/effect-easing.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"path": "web-animations/keyframe-effect/getComputedTiming.html",
|
"path": "web-animations/keyframe-effect/getComputedTiming.html",
|
||||||
"url": "/web-animations/keyframe-effect/getComputedTiming.html"
|
"url": "/web-animations/keyframe-effect/getComputedTiming.html"
|
||||||
|
@ -32581,6 +33249,26 @@
|
||||||
"timeout": "long",
|
"timeout": "long",
|
||||||
"url": "/html/browsers/browsing-the-web/scroll-to-fragid/007.html"
|
"url": "/html/browsers/browsing-the-web/scroll-to-fragid/007.html"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"path": "html/browsers/browsing-the-web/scroll-to-fragid/scroll-frag-percent-encoded.html",
|
||||||
|
"timeout": "long",
|
||||||
|
"url": "/html/browsers/browsing-the-web/scroll-to-fragid/scroll-frag-percent-encoded.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "html/browsers/browsing-the-web/scroll-to-fragid/scroll-to-anchor-name.html",
|
||||||
|
"timeout": "long",
|
||||||
|
"url": "/html/browsers/browsing-the-web/scroll-to-fragid/scroll-to-anchor-name.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "html/browsers/browsing-the-web/scroll-to-fragid/scroll-to-id-top.html",
|
||||||
|
"timeout": "long",
|
||||||
|
"url": "/html/browsers/browsing-the-web/scroll-to-fragid/scroll-to-id-top.html"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "html/browsers/browsing-the-web/scroll-to-fragid/scroll-to-top.html",
|
||||||
|
"timeout": "long",
|
||||||
|
"url": "/html/browsers/browsing-the-web/scroll-to-fragid/scroll-to-top.html"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"path": "html/browsers/history/the-history-interface/007.html",
|
"path": "html/browsers/history/the-history-interface/007.html",
|
||||||
"timeout": "long",
|
"timeout": "long",
|
||||||
|
@ -33806,50 +34494,7 @@
|
||||||
},
|
},
|
||||||
"local_changes": {
|
"local_changes": {
|
||||||
"deleted": [],
|
"deleted": [],
|
||||||
"items": {
|
"items": {},
|
||||||
"testharness": {
|
|
||||||
"WebIDL/ecmascript-binding/has-instance.html": [
|
|
||||||
{
|
|
||||||
"path": "WebIDL/ecmascript-binding/has-instance.html",
|
|
||||||
"url": "/WebIDL/ecmascript-binding/has-instance.html"
|
|
||||||
}
|
|
||||||
],
|
|
||||||
"XMLHttpRequest/responsexml-get-twice.htm": [
|
|
||||||
{
|
|
||||||
"path": "XMLHttpRequest/responsexml-get-twice.htm",
|
|
||||||
"url": "/XMLHttpRequest/responsexml-get-twice.htm"
|
|
||||||
}
|
|
||||||
],
|
|
||||||
"html/browsers/browsing-the-web/scroll-to-fragid/scroll-frag-percent-encoded.html": [
|
|
||||||
{
|
|
||||||
"path": "html/browsers/browsing-the-web/scroll-to-fragid/scroll-frag-percent-encoded.html",
|
|
||||||
"timeout": "long",
|
|
||||||
"url": "/html/browsers/browsing-the-web/scroll-to-fragid/scroll-frag-percent-encoded.html"
|
|
||||||
}
|
|
||||||
],
|
|
||||||
"html/browsers/browsing-the-web/scroll-to-fragid/scroll-to-anchor-name.html": [
|
|
||||||
{
|
|
||||||
"path": "html/browsers/browsing-the-web/scroll-to-fragid/scroll-to-anchor-name.html",
|
|
||||||
"timeout": "long",
|
|
||||||
"url": "/html/browsers/browsing-the-web/scroll-to-fragid/scroll-to-anchor-name.html"
|
|
||||||
}
|
|
||||||
],
|
|
||||||
"html/browsers/browsing-the-web/scroll-to-fragid/scroll-to-id-top.html": [
|
|
||||||
{
|
|
||||||
"path": "html/browsers/browsing-the-web/scroll-to-fragid/scroll-to-id-top.html",
|
|
||||||
"timeout": "long",
|
|
||||||
"url": "/html/browsers/browsing-the-web/scroll-to-fragid/scroll-to-id-top.html"
|
|
||||||
}
|
|
||||||
],
|
|
||||||
"html/browsers/browsing-the-web/scroll-to-fragid/scroll-to-top.html": [
|
|
||||||
{
|
|
||||||
"path": "html/browsers/browsing-the-web/scroll-to-fragid/scroll-to-top.html",
|
|
||||||
"timeout": "long",
|
|
||||||
"url": "/html/browsers/browsing-the-web/scroll-to-fragid/scroll-to-top.html"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
},
|
|
||||||
"reftest_nodes": {}
|
"reftest_nodes": {}
|
||||||
},
|
},
|
||||||
"reftest_nodes": {
|
"reftest_nodes": {
|
||||||
|
@ -39962,7 +40607,7 @@
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"rev": "95aad3bd9b82b5c65d84d53517b65ba084de9394",
|
"rev": "7ed49cff4d031720f829c01df837ed7a09ad5c60",
|
||||||
"url_base": "/",
|
"url_base": "/",
|
||||||
"version": 2
|
"version": 2
|
||||||
}
|
}
|
||||||
|
|
|
@ -2,3 +2,4 @@
|
||||||
type: testharness
|
type: testharness
|
||||||
[Timeout test: timeout hit before load, timeout scheduled at 2000]
|
[Timeout test: timeout hit before load, timeout scheduled at 2000]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
|
|
@ -131,3 +131,4 @@
|
||||||
|
|
||||||
[remote (null) to local (*), expect to fail]
|
[remote (null) to local (*), expect to fail]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
|
|
@ -1,5 +1,5 @@
|
||||||
[scroll-frag-percent-encoded.html]
|
[scroll-frag-percent-encoded.html]
|
||||||
type: testharness
|
type: testharness
|
||||||
|
|
||||||
[Fragment Navigation: fragment id should be percent-decoded]
|
[Fragment Navigation: fragment id should be percent-decoded]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
|
|
@ -1,5 +1,5 @@
|
||||||
[scroll-to-anchor-name.html]
|
[scroll-to-anchor-name.html]
|
||||||
type: testharness
|
type: testharness
|
||||||
|
|
||||||
[Fragment Navigation: scroll to anchor name is lower priority than equal id]
|
[Fragment Navigation: scroll to anchor name is lower priority than equal id]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
|
|
@ -1,5 +1,5 @@
|
||||||
[scroll-to-id-top.html]
|
[scroll-to-id-top.html]
|
||||||
type: testharness
|
type: testharness
|
||||||
|
|
||||||
[Fragment Navigation: TOP is a valid element id, which overrides navigating to top of the document]
|
[Fragment Navigation: TOP is a valid element id, which overrides navigating to top of the document]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
|
|
@ -1,5 +1,5 @@
|
||||||
[scroll-to-top.html]
|
[scroll-to-top.html]
|
||||||
type: testharness
|
type: testharness
|
||||||
|
|
||||||
[Fragment Navigation: When fragid is TOP scroll to the top of the document]
|
[Fragment Navigation: When fragid is TOP scroll to the top of the document]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
|
|
@ -12,3 +12,6 @@
|
||||||
[Dynamic name]
|
[Dynamic name]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
[duplicate property names]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
|
|
@ -8889,9 +8889,6 @@
|
||||||
[HTMLAreaElement interface: document.createElement("area") must inherit property "hash" with the proper type (19)]
|
[HTMLAreaElement interface: document.createElement("area") must inherit property "hash" with the proper type (19)]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Location interface: window.location must have own property "origin"]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Location interface: calling replace(USVString) on window.location with too few arguments must throw TypeError]
|
[Location interface: calling replace(USVString) on window.location with too few arguments must throw TypeError]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
@ -9090,3 +9087,15 @@
|
||||||
[History interface: window.history must inherit property "replaceState" with the proper type (7)]
|
[History interface: window.history must inherit property "replaceState" with the proper type (7)]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
[HTMLAllCollection interface: attribute length]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[HTMLAllCollection interface: document.all must inherit property "length" with the proper type (0)]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[HTMLAllCollection interface: document.all must inherit property "item" with the proper type (2)]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[HTMLAllCollection interface: document.all must inherit property "namedItem" with the proper type (3)]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
|
|
@ -846,9 +846,6 @@
|
||||||
[img.crossOrigin: IDL set to "\\0" followed by IDL get]
|
[img.crossOrigin: IDL set to "\\0" followed by IDL get]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[img.crossOrigin: IDL set to null followed by IDL get]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[img.crossOrigin: IDL set to object "test-toString" followed by getAttribute()]
|
[img.crossOrigin: IDL set to object "test-toString" followed by getAttribute()]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
@ -10101,9 +10098,6 @@
|
||||||
[video.crossOrigin: IDL set to "\\0" followed by IDL get]
|
[video.crossOrigin: IDL set to "\\0" followed by IDL get]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[video.crossOrigin: IDL set to null followed by IDL get]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[video.crossOrigin: IDL set to object "test-toString" followed by getAttribute()]
|
[video.crossOrigin: IDL set to object "test-toString" followed by getAttribute()]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
@ -12423,9 +12417,6 @@
|
||||||
[audio.crossOrigin: IDL set to "\\0" followed by IDL get]
|
[audio.crossOrigin: IDL set to "\\0" followed by IDL get]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[audio.crossOrigin: IDL set to null followed by IDL get]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[audio.crossOrigin: IDL set to object "test-toString" followed by getAttribute()]
|
[audio.crossOrigin: IDL set to object "test-toString" followed by getAttribute()]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
@ -22113,3 +22104,15 @@
|
||||||
[video.height: IDL set to 4294967295 followed by IDL get]
|
[video.height: IDL set to 4294967295 followed by IDL get]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
[img.crossOrigin: IDL set to "" followed by IDL get]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[img.crossOrigin: IDL set to null followed by getAttribute()]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[video.crossOrigin: IDL set to null followed by getAttribute()]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[audio.crossOrigin: IDL set to null followed by getAttribute()]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
|
|
@ -1947,9 +1947,6 @@
|
||||||
[script.crossOrigin: IDL set to "\\0" followed by IDL get]
|
[script.crossOrigin: IDL set to "\\0" followed by IDL get]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[script.crossOrigin: IDL set to null followed by IDL get]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[script.crossOrigin: IDL set to object "test-toString" followed by getAttribute()]
|
[script.crossOrigin: IDL set to object "test-toString" followed by getAttribute()]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
@ -12999,3 +12996,6 @@
|
||||||
[dialog.itemId: IDL set to object "test-valueOf" followed by IDL get]
|
[dialog.itemId: IDL set to object "test-valueOf" followed by IDL get]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
[script.crossOrigin: IDL set to null followed by getAttribute()]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
|
|
@ -0,0 +1,6 @@
|
||||||
|
[update-media.html]
|
||||||
|
type: testharness
|
||||||
|
expected: TIMEOUT
|
||||||
|
[set media after src updates selected image]
|
||||||
|
expected: TIMEOUT
|
||||||
|
|
|
@ -903,3 +903,66 @@
|
||||||
[change state from button to color]
|
[change state from button to color]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
[change state from hidden to file]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[change state from text to file]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[change state from search to file]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[change state from tel to file]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[change state from url to file]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[change state from email to file]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[change state from password to file]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[change state from datetime to file]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[change state from date to file]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[change state from month to file]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[change state from week to file]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[change state from time to file]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[change state from number to file]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[change state from range to file]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[change state from color to file]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[change state from checkbox to file]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[change state from radio to file]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[change state from submit to file]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[change state from image to file]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[change state from reset to file]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[change state from button to file]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
|
|
@ -0,0 +1,5 @@
|
||||||
|
[indeterminate-radio.html]
|
||||||
|
type: testharness
|
||||||
|
[:indeterminate and input type=radio]
|
||||||
|
expected: FAIL
|
||||||
|
|
|
@ -1 +1 @@
|
||||||
5942e9e3cb2fb588eb82198fd5548a42303a559f
|
33f0040496bde88683cfadb4068183f7d08a5f1c
|
|
@ -2,7 +2,6 @@
|
||||||
<title>IDBFactory.open() - errors in version argument</title>
|
<title>IDBFactory.open() - errors in version argument</title>
|
||||||
<script src=/resources/testharness.js></script>
|
<script src=/resources/testharness.js></script>
|
||||||
<script src=/resources/testharnessreport.js></script>
|
<script src=/resources/testharnessreport.js></script>
|
||||||
<script src=support.js></script>
|
|
||||||
|
|
||||||
<script>
|
<script>
|
||||||
function should_throw(val, name) {
|
function should_throw(val, name) {
|
||||||
|
@ -26,7 +25,6 @@ should_throw(NaN)
|
||||||
should_throw(Infinity)
|
should_throw(Infinity)
|
||||||
should_throw(-Infinity)
|
should_throw(-Infinity)
|
||||||
should_throw("foo")
|
should_throw("foo")
|
||||||
should_throw(undefined)
|
|
||||||
should_throw(null)
|
should_throw(null)
|
||||||
should_throw(false)
|
should_throw(false)
|
||||||
|
|
||||||
|
@ -46,17 +44,27 @@ should_throw({
|
||||||
|
|
||||||
/* Valid */
|
/* Valid */
|
||||||
|
|
||||||
function should_work(val) {
|
function should_work(val, expected_version) {
|
||||||
var name = format_value(val);
|
var name = format_value(val);
|
||||||
var t = async_test("Calling open() with version argument " + name + " should not throw.")
|
var dbname = 'test-db-does-not-exist';
|
||||||
var rq = createdb(t, val)
|
async_test(function(t) {
|
||||||
rq.onupgradeneeded = function() {
|
window.indexedDB.deleteDatabase(dbname);
|
||||||
t.done()
|
var rq = window.indexedDB.open(dbname, val);
|
||||||
}
|
rq.onupgradeneeded = t.step_func(function() {
|
||||||
|
var db = rq.result;
|
||||||
|
assert_equals(db.version, expected_version, 'version');
|
||||||
|
rq.transaction.abort();
|
||||||
|
});
|
||||||
|
rq.onsuccess = t.unreached_func("open should fail");
|
||||||
|
rq.onerror = t.step_func(function() {
|
||||||
|
t.done()
|
||||||
|
});
|
||||||
|
}, "Calling open() with version argument " + name + " should not throw.")
|
||||||
}
|
}
|
||||||
|
|
||||||
should_work(1.5)
|
should_work(1.5, 1)
|
||||||
should_work(Number.MAX_SAFE_INTEGER) // 0x20000000000000 - 1
|
should_work(Number.MAX_SAFE_INTEGER, Number.MAX_SAFE_INTEGER) // 0x20000000000000 - 1
|
||||||
|
should_work(undefined, 1)
|
||||||
|
|
||||||
</script>
|
</script>
|
||||||
|
|
||||||
|
|
|
@ -17,15 +17,9 @@
|
||||||
db = event.target.result;
|
db = event.target.result;
|
||||||
ostore = db.createObjectStore("store", {keyPath:"pKey"});
|
ostore = db.createObjectStore("store", {keyPath:"pKey"});
|
||||||
db.deleteObjectStore("store");
|
db.deleteObjectStore("store");
|
||||||
}
|
assert_throws("InvalidStateError", function(){
|
||||||
|
ostore.add({ pKey: "primaryKey_0"});
|
||||||
open_rq.onsuccess = function (event) {
|
|
||||||
t.step(function(){
|
|
||||||
assert_throws("InvalidStateError", function(){
|
|
||||||
ostore.add({ pKey: "primaryKey_0"});
|
|
||||||
});
|
|
||||||
});
|
});
|
||||||
t.done();
|
t.done();
|
||||||
}
|
}
|
||||||
</script>
|
</script>
|
||||||
|
|
||||||
|
|
|
@ -17,15 +17,9 @@
|
||||||
db = event.target.result;
|
db = event.target.result;
|
||||||
ostore = db.createObjectStore("store", {keyPath:"pKey"});
|
ostore = db.createObjectStore("store", {keyPath:"pKey"});
|
||||||
db.deleteObjectStore("store");
|
db.deleteObjectStore("store");
|
||||||
}
|
assert_throws("InvalidStateError", function(){
|
||||||
|
ostore.clear();
|
||||||
open_rq.onsuccess = function (event) {
|
|
||||||
t.step(function(){
|
|
||||||
assert_throws("InvalidStateError", function(){
|
|
||||||
ostore.clear();
|
|
||||||
});
|
|
||||||
});
|
});
|
||||||
t.done();
|
t.done();
|
||||||
}
|
}
|
||||||
</script>
|
</script>
|
||||||
|
|
||||||
|
|
|
@ -17,15 +17,9 @@
|
||||||
db = event.target.result;
|
db = event.target.result;
|
||||||
ostore = db.createObjectStore("store", {keyPath:"pKey"});
|
ostore = db.createObjectStore("store", {keyPath:"pKey"});
|
||||||
db.deleteObjectStore("store");
|
db.deleteObjectStore("store");
|
||||||
}
|
assert_throws("InvalidStateError", function(){
|
||||||
|
ostore.count();
|
||||||
open_rq.onsuccess = function (event) {
|
|
||||||
t.step(function(){
|
|
||||||
assert_throws("InvalidStateError", function(){
|
|
||||||
ostore.count();
|
|
||||||
});
|
|
||||||
});
|
});
|
||||||
t.done();
|
t.done();
|
||||||
}
|
}
|
||||||
</script>
|
</script>
|
||||||
|
|
||||||
|
|
|
@ -19,15 +19,9 @@
|
||||||
db = event.target.result;
|
db = event.target.result;
|
||||||
ostore = db.createObjectStore("store", {keyPath:"pKey"});
|
ostore = db.createObjectStore("store", {keyPath:"pKey"});
|
||||||
db.deleteObjectStore("store");
|
db.deleteObjectStore("store");
|
||||||
}
|
assert_throws("InvalidStateError", function(){
|
||||||
|
ostore.delete("primaryKey_0");
|
||||||
open_rq.onsuccess = function (event) {
|
|
||||||
t.step(function(){
|
|
||||||
assert_throws("InvalidStateError", function(){
|
|
||||||
ostore.delete("primaryKey_0");
|
|
||||||
});
|
|
||||||
});
|
});
|
||||||
t.done();
|
t.done();
|
||||||
}
|
}
|
||||||
</script>
|
</script>
|
||||||
|
|
||||||
|
|
|
@ -17,15 +17,9 @@
|
||||||
db = event.target.result;
|
db = event.target.result;
|
||||||
ostore = db.createObjectStore("store", {keyPath:"pKey"});
|
ostore = db.createObjectStore("store", {keyPath:"pKey"});
|
||||||
db.deleteObjectStore("store");
|
db.deleteObjectStore("store");
|
||||||
}
|
assert_throws("InvalidStateError", function(){
|
||||||
|
ostore.put({pKey: "primaryKey_0"});
|
||||||
open_rq.onsuccess = function (event) {
|
|
||||||
t.step(function(){
|
|
||||||
assert_throws("InvalidStateError", function(){
|
|
||||||
ostore.put({pKey: "primaryKey_0"});
|
|
||||||
});
|
|
||||||
});
|
});
|
||||||
t.done();
|
t.done();
|
||||||
}
|
}
|
||||||
</script>
|
</script>
|
||||||
|
|
||||||
|
|
|
@ -33,7 +33,7 @@
|
||||||
return fd;
|
return fd;
|
||||||
}
|
}
|
||||||
|
|
||||||
do_test("formdata with blob", create_formdata(['key', new Blob(['value'], {type: 'text/x-value'})]), 'key=value,\n');
|
do_test("formdata with blob", create_formdata(['key', new Blob(['value'], {type: 'text/x-value'})]), '\nkey=blob:text/x-value:5,');
|
||||||
do_test("formdata with named blob", create_formdata(['key', new Blob(['value'], {type: 'text/x-value'}), 'blob.txt']), '\nkey=blob.txt:text/x-value:5,');
|
do_test("formdata with named blob", create_formdata(['key', new Blob(['value'], {type: 'text/x-value'}), 'blob.txt']), '\nkey=blob.txt:text/x-value:5,');
|
||||||
// If 3rd argument is given and 2nd is not a Blob, formdata.append() should throw
|
// If 3rd argument is given and 2nd is not a Blob, formdata.append() should throw
|
||||||
var test = async_test('formdata.append() should throw if value is string and file name is given'); // needs to be async just because the others above are
|
var test = async_test('formdata.append() should throw if value is string and file name is given'); // needs to be async just because the others above are
|
||||||
|
|
15
tests/wpt/web-platform-tests/cookies/resources/echo-json.py
Normal file
15
tests/wpt/web-platform-tests/cookies/resources/echo-json.py
Normal file
|
@ -0,0 +1,15 @@
|
||||||
|
import json
|
||||||
|
|
||||||
|
def main(request, response):
|
||||||
|
headers = [("Content-Type", "application/json"),
|
||||||
|
("Access-Control-Allow-Credentials", "true")]
|
||||||
|
|
||||||
|
if "origin" in request.headers:
|
||||||
|
headers.append(("Access-Control-Allow-Origin", request.headers["origin"]))
|
||||||
|
|
||||||
|
values = []
|
||||||
|
for key in request.cookies:
|
||||||
|
for value in request.cookies.get_list(key):
|
||||||
|
values.append("\"%s\": \"%s\"" % (key, value))
|
||||||
|
body = "{ %s }" % ",".join(values)
|
||||||
|
return headers, body
|
|
@ -0,0 +1,49 @@
|
||||||
|
// Given an array of potentially asynchronous tests, this function will execute
|
||||||
|
// each in serial, ensuring that one and only one test is executing at a time.
|
||||||
|
//
|
||||||
|
// The test array should look like this:
|
||||||
|
//
|
||||||
|
//
|
||||||
|
// var tests = [
|
||||||
|
// [
|
||||||
|
// "Test description goes here.",
|
||||||
|
// function () {
|
||||||
|
// // Test code goes here. `this` is bound to the test object.
|
||||||
|
// }
|
||||||
|
// ],
|
||||||
|
// ...
|
||||||
|
// ];
|
||||||
|
//
|
||||||
|
// The |setup| and |teardown| arguments are functions which are executed before
|
||||||
|
// and after each test, respectively.
|
||||||
|
function executeTestsSerially(testList, setup, teardown) {
|
||||||
|
var tests = testList.map(function (t) {
|
||||||
|
return {
|
||||||
|
test: async_test(t[0]),
|
||||||
|
code: t[1]
|
||||||
|
};
|
||||||
|
});
|
||||||
|
|
||||||
|
var executeNextTest = function () {
|
||||||
|
var current = tests.shift();
|
||||||
|
if (current === undefined) {
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
// Setup the test fixtures.
|
||||||
|
if (setup) {
|
||||||
|
setup();
|
||||||
|
}
|
||||||
|
|
||||||
|
// Bind a callback to tear down the test fixtures.
|
||||||
|
if (teardown) {
|
||||||
|
current.test.add_cleanup(teardown);
|
||||||
|
}
|
||||||
|
|
||||||
|
// Execute the test.
|
||||||
|
current.test.step(current.code);
|
||||||
|
};
|
||||||
|
|
||||||
|
add_result_callback(function () { setTimeout(executeNextTest, 0) });
|
||||||
|
executeNextTest();
|
||||||
|
}
|
|
@ -0,0 +1,47 @@
|
||||||
|
<!doctype html>
|
||||||
|
<html>
|
||||||
|
<head>
|
||||||
|
<meta charset=utf-8>
|
||||||
|
<title>Set 'secure' cookie from `document.cookie` on a secure page</title>
|
||||||
|
<meta name=help href="https://tools.ietf.org/html/draft-west-leave-secure-cookies-alone">
|
||||||
|
<script src="/resources/testharness.js"></script>
|
||||||
|
<script src="/resources/testharnessreport.js"></script>
|
||||||
|
<script src="/cookies/resources/testharness-helpers.js"></script>
|
||||||
|
</head>
|
||||||
|
<body>
|
||||||
|
<div id=log></div>
|
||||||
|
<script>
|
||||||
|
var tests = [
|
||||||
|
[
|
||||||
|
"'secure' cookie visible in `document.cookie`",
|
||||||
|
function () {
|
||||||
|
document.cookie = "secure_from_secure_dom=1; secure; path=/";
|
||||||
|
assert_not_equals(document.cookie.match(/secure_from_secure_dom=1/), null);
|
||||||
|
this.done();
|
||||||
|
}
|
||||||
|
],
|
||||||
|
[
|
||||||
|
"'secure' cookie visible in HTTP request",
|
||||||
|
function () {
|
||||||
|
document.cookie = "secure_from_secure_dom=1; secure; path=/";
|
||||||
|
assert_not_equals(document.cookie.match(/secure_from_secure_dom=1/), null);
|
||||||
|
fetch("https://{{host}}:{{ports[https][0]}}/cookies/resources/echo-json.py",
|
||||||
|
{ "credentials": "include" })
|
||||||
|
.then(this.step_func(function (r) {
|
||||||
|
return r.json();
|
||||||
|
}))
|
||||||
|
.then(this.step_func_done(function (j) {
|
||||||
|
assert_equals(j["secure_from_secure_dom"], "secure_from_secure_dom=1");
|
||||||
|
}));
|
||||||
|
}
|
||||||
|
]
|
||||||
|
];
|
||||||
|
|
||||||
|
function clearKnownCookie() {
|
||||||
|
document.cookie = "secure_from_secure_dom=0; Secure; expires=Thu, 01 Jan 1970 00:00:01 GMT; path=/";
|
||||||
|
}
|
||||||
|
|
||||||
|
executeTestsSerially(tests, clearKnownCookie, clearKnownCookie);
|
||||||
|
</script>
|
||||||
|
</body>
|
||||||
|
</html>
|
|
@ -0,0 +1,47 @@
|
||||||
|
<!doctype html>
|
||||||
|
<html>
|
||||||
|
<head>
|
||||||
|
<meta charset=utf-8>
|
||||||
|
<title>Set 'secure' cookie from `document.cookie` on a non-secure page</title>
|
||||||
|
<meta name=help href="https://tools.ietf.org/html/draft-west-leave-secure-cookies-alone">
|
||||||
|
<script src="/resources/testharness.js"></script>
|
||||||
|
<script src="/resources/testharnessreport.js"></script>
|
||||||
|
<script src="/cookies/resources/testharness-helpers.js"></script>
|
||||||
|
</head>
|
||||||
|
<body>
|
||||||
|
<div id=log></div>
|
||||||
|
<script>
|
||||||
|
var tests = [
|
||||||
|
[
|
||||||
|
"'secure' cookie not set in `document.cookie`",
|
||||||
|
function () {
|
||||||
|
var originalCookie = document.cookie;
|
||||||
|
document.cookie = "secure_from_nonsecure_dom=1; secure; path=/";
|
||||||
|
assert_equals(document.cookie, originalCookie);
|
||||||
|
this.done();
|
||||||
|
}
|
||||||
|
],
|
||||||
|
[
|
||||||
|
"'secure' cookie not sent in HTTP request",
|
||||||
|
function () {
|
||||||
|
document.cookie = "secure_from_nonsecure_dom=1; secure; path=/";
|
||||||
|
fetch("https://{{host}}:{{ports[https][0]}}/cookies/resources/echo-json.py", { "credentials": "include" })
|
||||||
|
.then(this.step_func(function (r) {
|
||||||
|
return r.json();
|
||||||
|
}))
|
||||||
|
.then(this.step_func_done(function (j) {
|
||||||
|
assert_equals(j["secure_from_nonsecure_dom"], undefined);
|
||||||
|
}));
|
||||||
|
}
|
||||||
|
]
|
||||||
|
];
|
||||||
|
|
||||||
|
function clearKnownCookie() {
|
||||||
|
document.cookie = "secure_from_nonsecure_dom=0; Secure; expires=Thu, 01 Jan 1970 00:00:01 GMT; path=/";
|
||||||
|
}
|
||||||
|
|
||||||
|
executeTestsSerially(tests, clearKnownCookie, clearKnownCookie);
|
||||||
|
</script>
|
||||||
|
</body>
|
||||||
|
</html>
|
||||||
|
|
|
@ -0,0 +1,36 @@
|
||||||
|
<!doctype html>
|
||||||
|
<html>
|
||||||
|
<head>
|
||||||
|
<meta charset=utf-8>
|
||||||
|
<title>Set 'secure' cookie from `Set-Cookie` HTTP header on a secure page</title>
|
||||||
|
<meta name=help href="https://tools.ietf.org/html/draft-west-leave-secure-cookies-alone">
|
||||||
|
<script src="/resources/testharness.js"></script>
|
||||||
|
<script src="/resources/testharnessreport.js"></script>
|
||||||
|
<script src="/cookies/resources/testharness-helpers.js"></script>
|
||||||
|
</head>
|
||||||
|
<body>
|
||||||
|
<div id=log></div>
|
||||||
|
<script>
|
||||||
|
function clearKnownCookie() {
|
||||||
|
document.cookie = "secure_from_secure_http=0; Secure; expires=Thu, 01 Jan 1970 00:00:01 GMT; path=/";
|
||||||
|
}
|
||||||
|
|
||||||
|
test(function () {
|
||||||
|
assert_not_equals(document.cookie.match(/secure_from_secure_http=1/), null);
|
||||||
|
}, "'secure' cookie present in `document.cookie`");
|
||||||
|
|
||||||
|
promise_test(function (t) {
|
||||||
|
t.add_cleanup(clearKnownCookie);
|
||||||
|
return fetch("https://{{host}}:{{ports[https][0]}}/cookies/resources/echo-json.py",
|
||||||
|
{ "credentials": "include" })
|
||||||
|
.then(function (r) {
|
||||||
|
return r.json();
|
||||||
|
})
|
||||||
|
.then(function (j) {
|
||||||
|
assert_equals(j["secure_from_secure_http"], "secure_from_secure_http=1");
|
||||||
|
});
|
||||||
|
}, "'secure' cookie sent in HTTP request");
|
||||||
|
</script>
|
||||||
|
</body>
|
||||||
|
</html>
|
||||||
|
|
|
@ -0,0 +1,5 @@
|
||||||
|
Expires: Mon, 26 Jul 1997 05:00:00 GMT
|
||||||
|
Cache-Control: no-store, no-cache, must-revalidate
|
||||||
|
Cache-Control: post-check=0, pre-check=0, false
|
||||||
|
Pragma: no-cache
|
||||||
|
Set-Cookie: secure_from_secure_http=1; Secure; Path=/
|
|
@ -0,0 +1,36 @@
|
||||||
|
<!doctype html>
|
||||||
|
<html>
|
||||||
|
<head>
|
||||||
|
<meta charset=utf-8>
|
||||||
|
<title>Set 'secure' cookie from `Set-Cookie` HTTP header on a non-secure page</title>
|
||||||
|
<meta name=help href="https://tools.ietf.org/html/draft-west-leave-secure-cookies-alone">
|
||||||
|
<script src="/resources/testharness.js"></script>
|
||||||
|
<script src="/resources/testharnessreport.js"></script>
|
||||||
|
<script src="/cookies/resources/testharness-helpers.js"></script>
|
||||||
|
</head>
|
||||||
|
<body>
|
||||||
|
<div id=log></div>
|
||||||
|
<script>
|
||||||
|
function clearKnownCookie() {
|
||||||
|
document.cookie = "secure_from_nonsecure_http=0; Secure; expires=Thu, 01 Jan 1970 00:00:01 GMT; path=/";
|
||||||
|
}
|
||||||
|
|
||||||
|
test(function () {
|
||||||
|
assert_equals(document.cookie.match(/secure_from_nonsecure_http=1/), null);
|
||||||
|
}, "'secure' cookie not present in `document.cookie`");
|
||||||
|
|
||||||
|
promise_test(function (t) {
|
||||||
|
t.add_cleanup(clearKnownCookie);
|
||||||
|
return fetch("https://{{host}}:{{ports[https][0]}}/cookies/resources/echo-json.py",
|
||||||
|
{ "credentials": "include" })
|
||||||
|
.then(function (r) {
|
||||||
|
return r.json();
|
||||||
|
})
|
||||||
|
.then(function (j) {
|
||||||
|
assert_equals(j["secure_from_nonsecure_http"], undefined);
|
||||||
|
});
|
||||||
|
}, "'secure' cookie not sent in HTTP request");
|
||||||
|
</script>
|
||||||
|
</body>
|
||||||
|
</html>
|
||||||
|
|
|
@ -0,0 +1,5 @@
|
||||||
|
Expires: Mon, 26 Jul 1997 05:00:00 GMT
|
||||||
|
Cache-Control: no-store, no-cache, must-revalidate
|
||||||
|
Cache-Control: post-check=0, pre-check=0, false
|
||||||
|
Pragma: no-cache
|
||||||
|
Set-Cookie: secure_from_nonsecure_http=1; Secure; Path=/
|
|
@ -0,0 +1,45 @@
|
||||||
|
<!doctype html>
|
||||||
|
<html>
|
||||||
|
<head>
|
||||||
|
<meta charset=utf-8>
|
||||||
|
<title>Set 'secure' cookie from `Set-Cookie` HTTP header on a non-secure WebSocket</title>
|
||||||
|
<meta name=help href="https://tools.ietf.org/html/draft-west-leave-secure-cookies-alone">
|
||||||
|
<script src="/resources/testharness.js"></script>
|
||||||
|
<script src="/resources/testharnessreport.js"></script>
|
||||||
|
<script src="/cookies/resources/testharness-helpers.js"></script>
|
||||||
|
</head>
|
||||||
|
<body>
|
||||||
|
<div id=log></div>
|
||||||
|
<script>
|
||||||
|
function clearKnownCookie() {
|
||||||
|
document.cookie = "ws_test_secure_from_nonsecure=0; Secure; expires=Thu, 01 Jan 1970 00:00:01 GMT; path=/";
|
||||||
|
}
|
||||||
|
|
||||||
|
async_test(function (t) {
|
||||||
|
t.add_cleanup(clearKnownCookie);
|
||||||
|
assert_equals(document.cookie.match(/ws_test_secure_from_nonsecure=/), null);
|
||||||
|
|
||||||
|
clearKnownCookie();
|
||||||
|
var ws = new WebSocket("ws://{{host}}:{{ports[ws][0]}}/set-cookie-secure?secure_from_nonsecure");
|
||||||
|
ws.onclose = t.step_func_done(function () {
|
||||||
|
assert_unreached("'close' should not fire before 'open'.");
|
||||||
|
});
|
||||||
|
ws.onopen = t.step_func(function (e) {
|
||||||
|
ws.onclose = null;
|
||||||
|
ws.close();
|
||||||
|
assert_false(/ws_test_secure_from_nonsecure=test/.test(document.cookie));
|
||||||
|
|
||||||
|
var ws2 = new WebSocket("wss://{{host}}:{{ports[wss][0]}}/echo-cookie");
|
||||||
|
ws2.onclose = t.step_func_done(function () {
|
||||||
|
assert_unreached("'close' should not fire before 'open'.");
|
||||||
|
});
|
||||||
|
ws2.onmessage = t.step_func_done(function (e) {
|
||||||
|
ws2.onclose = null;
|
||||||
|
ws2.close();
|
||||||
|
assert_false(/ws_test_secure_from_nonsecure=test/.test(e.data));
|
||||||
|
});
|
||||||
|
});
|
||||||
|
}, "'secure' cookie not sent in WSS request when set from WS");
|
||||||
|
</script>
|
||||||
|
</body>
|
||||||
|
</html>
|
|
@ -0,0 +1,44 @@
|
||||||
|
<!doctype html>
|
||||||
|
<html>
|
||||||
|
<head>
|
||||||
|
<meta charset=utf-8>
|
||||||
|
<title>Set 'secure' cookie from `Set-Cookie` HTTP header on a secure WebSocket</title>
|
||||||
|
<meta name=help href="https://tools.ietf.org/html/draft-west-leave-secure-cookies-alone">
|
||||||
|
<script src="/resources/testharness.js"></script>
|
||||||
|
<script src="/resources/testharnessreport.js"></script>
|
||||||
|
<script src="/cookies/resources/testharness-helpers.js"></script>
|
||||||
|
</head>
|
||||||
|
<body>
|
||||||
|
<div id=log></div>
|
||||||
|
<script>
|
||||||
|
function clearKnownCookie() {
|
||||||
|
document.cookie = "ws_test_secure_from_secure=0; Secure; expires=Thu, 01 Jan 1970 00:00:01 GMT; path=/";
|
||||||
|
}
|
||||||
|
|
||||||
|
async_test(function (t) {
|
||||||
|
t.add_cleanup(clearKnownCookie);
|
||||||
|
assert_equals(document.cookie.match(/ws_test_secure_from_secure=/), null);
|
||||||
|
|
||||||
|
clearKnownCookie();
|
||||||
|
var ws = new WebSocket("wss://{{host}}:{{ports[wss][0]}}/set-cookie-secure?secure_from_secure");
|
||||||
|
ws.onclose = t.step_func_done(function () {
|
||||||
|
assert_unreached("'close' should not fire before 'open'.");
|
||||||
|
});
|
||||||
|
ws.onopen = t.step_func(function (e) {
|
||||||
|
ws.onclose = null;
|
||||||
|
ws.close();
|
||||||
|
assert_regexp_match(document.cookie, /ws_test_secure_from_secure=test/);
|
||||||
|
var ws2 = new WebSocket("wss://{{host}}:{{ports[wss][0]}}/echo-cookie");
|
||||||
|
ws2.onclose = t.step_func_done(function () {
|
||||||
|
assert_unreached("'close' should not fire before 'open'.");
|
||||||
|
});
|
||||||
|
ws2.onmessage = t.step_func_done(function (e) {
|
||||||
|
ws2.onclose = null;
|
||||||
|
ws2.close();
|
||||||
|
assert_regexp_match(e.data, /ws_test_secure_from_secure=test/);
|
||||||
|
});
|
||||||
|
});
|
||||||
|
}, "'secure' cookie not sent in HTTP request");
|
||||||
|
</script>
|
||||||
|
</body>
|
||||||
|
</html>
|
|
@ -10,6 +10,8 @@
|
||||||
<script src="/resources/testharnessreport.js"></script>
|
<script src="/resources/testharnessreport.js"></script>
|
||||||
<div id=log></div>
|
<div id=log></div>
|
||||||
<iframe name="bar"></iframe>
|
<iframe name="bar"></iframe>
|
||||||
|
<iframe name="baz"></iframe>
|
||||||
|
<iframe name="baz"></iframe>
|
||||||
<iframe name="constructor"></iframe>
|
<iframe name="constructor"></iframe>
|
||||||
<script>
|
<script>
|
||||||
function assert_data_propdesc(pd, Writable, Enumerable, Configurable) {
|
function assert_data_propdesc(pd, Writable, Enumerable, Configurable) {
|
||||||
|
@ -31,7 +33,7 @@ test(function() {
|
||||||
assert_true("bar" in gsp, "bar in gsp");
|
assert_true("bar" in gsp, "bar in gsp");
|
||||||
assert_true(gsp.hasOwnProperty("bar"), "gsp.hasOwnProperty(\"bar\")");
|
assert_true(gsp.hasOwnProperty("bar"), "gsp.hasOwnProperty(\"bar\")");
|
||||||
assert_data_propdesc(Object.getOwnPropertyDescriptor(gsp, "bar"),
|
assert_data_propdesc(Object.getOwnPropertyDescriptor(gsp, "bar"),
|
||||||
false, true, true);
|
true, false, true);
|
||||||
}, "Static name on the prototype");
|
}, "Static name on the prototype");
|
||||||
test(function() {
|
test(function() {
|
||||||
assert_equals(window.constructor, Window);
|
assert_equals(window.constructor, Window);
|
||||||
|
@ -45,10 +47,15 @@ test(function() {
|
||||||
|
|
||||||
var gsp = Object.getPrototypeOf(proto);
|
var gsp = Object.getPrototypeOf(proto);
|
||||||
assert_true("constructor" in gsp, "constructor in gsp");
|
assert_true("constructor" in gsp, "constructor in gsp");
|
||||||
assert_true(gsp.hasOwnProperty("constructor"), "gsp.hasOwnProperty(\"constructor\")");
|
assert_false(gsp.hasOwnProperty("constructor"), "gsp.hasOwnProperty(\"constructor\")");
|
||||||
assert_data_propdesc(Object.getOwnPropertyDescriptor(gsp, "constructor"),
|
assert_equals(Object.getOwnPropertyDescriptor(gsp, "constructor"), undefined);
|
||||||
false, true, true);
|
|
||||||
}, "constructor");
|
}, "constructor");
|
||||||
|
test(function() {
|
||||||
|
var gsp = Object.getPrototypeOf(Object.getPrototypeOf(window));
|
||||||
|
var names = Object.getOwnPropertyNames(gsp);
|
||||||
|
assert_equals(names.filter((name) => name == "baz").length, 1);
|
||||||
|
|
||||||
|
}, "duplicate property names")
|
||||||
var t = async_test("Dynamic name")
|
var t = async_test("Dynamic name")
|
||||||
var t2 = async_test("Ghost name")
|
var t2 = async_test("Ghost name")
|
||||||
t.step(function() {
|
t.step(function() {
|
||||||
|
|
|
@ -5,7 +5,7 @@ var embeddedElements = {
|
||||||
alt: "string",
|
alt: "string",
|
||||||
src: "url",
|
src: "url",
|
||||||
srcset: "string",
|
srcset: "string",
|
||||||
crossOrigin: {type: "enum", keywords: ["", "anonymous", "use-credentials"]},
|
crossOrigin: {type: "enum", keywords: ["anonymous", "use-credentials"], nonCanon:{"": "anonymous"}, isNullable: true, defaultVal: null, invalidVal: "anonymous"},
|
||||||
useMap: "string",
|
useMap: "string",
|
||||||
isMap: "boolean",
|
isMap: "boolean",
|
||||||
width: {type: "unsigned long", customGetter: true},
|
width: {type: "unsigned long", customGetter: true},
|
||||||
|
@ -84,7 +84,7 @@ var embeddedElements = {
|
||||||
video: {
|
video: {
|
||||||
// HTMLMediaElement
|
// HTMLMediaElement
|
||||||
src: "url",
|
src: "url",
|
||||||
crossOrigin: {type: "enum", keywords: ["anonymous", "use-credentials"], nonCanon:{"": "anonymous"}},
|
crossOrigin: {type: "enum", keywords: ["anonymous", "use-credentials"], nonCanon:{"": "anonymous"}, isNullable: true, defaultVal: null, invalidVal: "anonymous"},
|
||||||
// As with "keytype", we have no missing value default defined here.
|
// As with "keytype", we have no missing value default defined here.
|
||||||
preload: {type: "enum", keywords: ["none", "metadata", "auto"], nonCanon: {"": "auto"}, defaultVal: null},
|
preload: {type: "enum", keywords: ["none", "metadata", "auto"], nonCanon: {"": "auto"}, defaultVal: null},
|
||||||
autoplay: "boolean",
|
autoplay: "boolean",
|
||||||
|
@ -100,7 +100,7 @@ var embeddedElements = {
|
||||||
audio: {
|
audio: {
|
||||||
// HTMLMediaElement
|
// HTMLMediaElement
|
||||||
src: "url",
|
src: "url",
|
||||||
crossOrigin: {type: "enum", keywords: ["anonymous", "use-credentials"], nonCanon:{"": "anonymous"}},
|
crossOrigin: {type: "enum", keywords: ["anonymous", "use-credentials"], nonCanon:{"": "anonymous"}, isNullable: true, defaultVal: null, invalidVal: "anonymous"},
|
||||||
// As with "keytype", we have no missing value default defined here.
|
// As with "keytype", we have no missing value default defined here.
|
||||||
preload: {type: "enum", keywords: ["none", "metadata", "auto"], nonCanon: {"": "auto"}, defaultVal: null},
|
preload: {type: "enum", keywords: ["none", "metadata", "auto"], nonCanon: {"": "auto"}, defaultVal: null},
|
||||||
autoplay: "boolean",
|
autoplay: "boolean",
|
||||||
|
|
|
@ -13,7 +13,7 @@ var miscElements = {
|
||||||
charset: "string",
|
charset: "string",
|
||||||
// TODO: async attribute (complicated).
|
// TODO: async attribute (complicated).
|
||||||
defer: "boolean",
|
defer: "boolean",
|
||||||
crossOrigin: {type: "enum", keywords: ["anonymous", "use-credentials"], nonCanon:{"": "anonymous"}},
|
crossOrigin: {type: "enum", keywords: ["anonymous", "use-credentials"], nonCanon:{"": "anonymous"}, isNullable: true, defaultVal: null, invalidVal: "anonymous"},
|
||||||
},
|
},
|
||||||
noscript: {},
|
noscript: {},
|
||||||
|
|
||||||
|
|
|
@ -859,7 +859,7 @@ typedef (Int8Array or Uint8Array or Uint8ClampedArray or
|
||||||
[NoInterfaceObject, Exposed=Window]
|
[NoInterfaceObject, Exposed=Window]
|
||||||
interface HTMLHyperlinkElementUtils {
|
interface HTMLHyperlinkElementUtils {
|
||||||
stringifier attribute USVString href;
|
stringifier attribute USVString href;
|
||||||
attribute USVString origin;
|
readonly attribute USVString origin;
|
||||||
attribute USVString protocol;
|
attribute USVString protocol;
|
||||||
attribute USVString username;
|
attribute USVString username;
|
||||||
attribute USVString password;
|
attribute USVString password;
|
||||||
|
@ -871,11 +871,11 @@ interface HTMLHyperlinkElementUtils {
|
||||||
attribute USVString hash;
|
attribute USVString hash;
|
||||||
};
|
};
|
||||||
|
|
||||||
interface HTMLAllCollection : HTMLCollection {
|
interface HTMLAllCollection {
|
||||||
// inherits length and 'getter'
|
readonly attribute unsigned long length;
|
||||||
Element? item(unsigned long index);
|
getter Element? item(unsigned long index);
|
||||||
(HTMLCollection or Element)? item(DOMString name);
|
(HTMLCollection or Element)? item(DOMString name);
|
||||||
legacycaller getter (HTMLCollection or Element)? namedItem(DOMString name); // shadows inherited namedItem()
|
legacycaller getter (HTMLCollection or Element)? namedItem(DOMString name);
|
||||||
};
|
};
|
||||||
|
|
||||||
interface HTMLFormControlsCollection : HTMLCollection {
|
interface HTMLFormControlsCollection : HTMLCollection {
|
||||||
|
@ -1048,7 +1048,7 @@ interface HTMLBaseElement : HTMLElement {
|
||||||
|
|
||||||
interface HTMLLinkElement : HTMLElement {
|
interface HTMLLinkElement : HTMLElement {
|
||||||
attribute DOMString href;
|
attribute DOMString href;
|
||||||
attribute DOMString crossOrigin;
|
attribute DOMString? crossOrigin;
|
||||||
attribute DOMString rel;
|
attribute DOMString rel;
|
||||||
[PutForwards=value] readonly attribute DOMTokenList relList;
|
[PutForwards=value] readonly attribute DOMTokenList relList;
|
||||||
attribute DOMString media;
|
attribute DOMString media;
|
||||||
|
@ -1173,7 +1173,7 @@ interface HTMLImageElement : HTMLElement {
|
||||||
attribute DOMString src;
|
attribute DOMString src;
|
||||||
attribute DOMString srcset;
|
attribute DOMString srcset;
|
||||||
attribute DOMString sizes;
|
attribute DOMString sizes;
|
||||||
attribute DOMString crossOrigin;
|
attribute DOMString? crossOrigin;
|
||||||
attribute DOMString useMap;
|
attribute DOMString useMap;
|
||||||
attribute boolean isMap;
|
attribute boolean isMap;
|
||||||
attribute unsigned long width;
|
attribute unsigned long width;
|
||||||
|
@ -1286,7 +1286,7 @@ interface HTMLMediaElement : HTMLElement {
|
||||||
// network state
|
// network state
|
||||||
attribute DOMString src;
|
attribute DOMString src;
|
||||||
readonly attribute DOMString currentSrc;
|
readonly attribute DOMString currentSrc;
|
||||||
attribute DOMString crossOrigin;
|
attribute DOMString? crossOrigin;
|
||||||
const unsigned short NETWORK_EMPTY = 0;
|
const unsigned short NETWORK_EMPTY = 0;
|
||||||
const unsigned short NETWORK_IDLE = 1;
|
const unsigned short NETWORK_IDLE = 1;
|
||||||
const unsigned short NETWORK_LOADING = 2;
|
const unsigned short NETWORK_LOADING = 2;
|
||||||
|
@ -1949,7 +1949,7 @@ interface HTMLScriptElement : HTMLElement {
|
||||||
attribute DOMString charset;
|
attribute DOMString charset;
|
||||||
attribute boolean async;
|
attribute boolean async;
|
||||||
attribute boolean defer;
|
attribute boolean defer;
|
||||||
attribute DOMString crossOrigin;
|
attribute DOMString? crossOrigin;
|
||||||
attribute DOMString text;
|
attribute DOMString text;
|
||||||
|
|
||||||
// also has obsolete members
|
// also has obsolete members
|
||||||
|
@ -2304,7 +2304,7 @@ Window implements GlobalEventHandlers;
|
||||||
Window implements WindowEventHandlers;
|
Window implements WindowEventHandlers;
|
||||||
|
|
||||||
interface BarProp {
|
interface BarProp {
|
||||||
attribute boolean visible;
|
readonly attribute boolean visible;
|
||||||
};
|
};
|
||||||
|
|
||||||
enum ScrollRestoration { "auto", "manual" };
|
enum ScrollRestoration { "auto", "manual" };
|
||||||
|
@ -2322,7 +2322,7 @@ interface History {
|
||||||
|
|
||||||
[Unforgeable] interface Location {
|
[Unforgeable] interface Location {
|
||||||
stringifier attribute USVString href;
|
stringifier attribute USVString href;
|
||||||
attribute USVString origin;
|
readonly attribute USVString origin;
|
||||||
attribute USVString protocol;
|
attribute USVString protocol;
|
||||||
attribute USVString host;
|
attribute USVString host;
|
||||||
attribute USVString hostname;
|
attribute USVString hostname;
|
||||||
|
|
|
@ -271,6 +271,7 @@ ReflectionTests.typeMap = {
|
||||||
* "keywords": array of keywords as given by the spec (required)
|
* "keywords": array of keywords as given by the spec (required)
|
||||||
* "nonCanon": dictionary mapping non-canonical values to their
|
* "nonCanon": dictionary mapping non-canonical values to their
|
||||||
* canonical equivalents (defaults to {})
|
* canonical equivalents (defaults to {})
|
||||||
|
* "isNullable": Indicates if attribute is nullable (defaults to false)
|
||||||
*
|
*
|
||||||
* Tests are mostly hardcoded into reflects(), since they depend on the
|
* Tests are mostly hardcoded into reflects(), since they depend on the
|
||||||
* keywords. All expected values are computed in reflects() using a helper
|
* keywords. All expected values are computed in reflects() using a helper
|
||||||
|
@ -592,9 +593,14 @@ ReflectionTests.doReflects = function(data, idlName, idlObj, domName, domObj) {
|
||||||
|
|
||||||
var typeInfo = this.typeMap[data.type];
|
var typeInfo = this.typeMap[data.type];
|
||||||
|
|
||||||
|
if (typeof data.isNullable == "undefined") {
|
||||||
|
data.isNullable = false;
|
||||||
|
}
|
||||||
|
|
||||||
// Test that typeof idlObj[idlName] is correct. If not, further tests are
|
// Test that typeof idlObj[idlName] is correct. If not, further tests are
|
||||||
// probably pointless, so bail out.
|
// probably pointless, so bail out.
|
||||||
if (!ReflectionHarness.test(typeof idlObj[idlName], typeInfo.jsType, "typeof IDL attribute")) {
|
var isDefaultValueNull = data.isNullable && data.defaultVal === null;
|
||||||
|
if (!ReflectionHarness.test(typeof idlObj[idlName], isDefaultValueNull ? "object" : typeInfo.jsType, "typeof IDL attribute")) {
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -603,7 +609,7 @@ ReflectionTests.doReflects = function(data, idlName, idlObj, domName, domObj) {
|
||||||
if (defaultVal === undefined) {
|
if (defaultVal === undefined) {
|
||||||
defaultVal = typeInfo.defaultVal;
|
defaultVal = typeInfo.defaultVal;
|
||||||
}
|
}
|
||||||
if (defaultVal !== null) {
|
if (defaultVal !== null || data.isNullable) {
|
||||||
ReflectionHarness.test(idlObj[idlName], defaultVal, "IDL get with DOM attribute unset");
|
ReflectionHarness.test(idlObj[idlName], defaultVal, "IDL get with DOM attribute unset");
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -650,7 +656,14 @@ ReflectionTests.doReflects = function(data, idlName, idlObj, domName, domObj) {
|
||||||
|
|
||||||
// Per spec, the expected DOM values are the same as the value we set
|
// Per spec, the expected DOM values are the same as the value we set
|
||||||
// it to.
|
// it to.
|
||||||
idlDomExpected = idlTests.slice(0);
|
if (!data.isNullable) {
|
||||||
|
idlDomExpected = idlTests.slice(0);
|
||||||
|
} else {
|
||||||
|
idlDomExpected = [];
|
||||||
|
for (var i = 0; i < idlTests.length; i++) {
|
||||||
|
idlDomExpected.push((idlTests[i] === null || idlTests[i] === undefined) ? null : idlTests[i]);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
// Now we have the fun of calculating what the expected IDL values are.
|
// Now we have the fun of calculating what the expected IDL values are.
|
||||||
domExpected = [];
|
domExpected = [];
|
||||||
|
@ -659,7 +672,11 @@ ReflectionTests.doReflects = function(data, idlName, idlObj, domName, domObj) {
|
||||||
domExpected.push(this.enumExpected(data.keywords, data.nonCanon, data.invalidVal, domTests[i]));
|
domExpected.push(this.enumExpected(data.keywords, data.nonCanon, data.invalidVal, domTests[i]));
|
||||||
}
|
}
|
||||||
for (var i = 0; i < idlTests.length; i++) {
|
for (var i = 0; i < idlTests.length; i++) {
|
||||||
idlIdlExpected.push(this.enumExpected(data.keywords, data.nonCanon, data.invalidVal, idlTests[i]));
|
if (data.isNullable && (idlTests[i] === null || idlTests[i] === undefined)) {
|
||||||
|
idlIdlExpected.push(null);
|
||||||
|
} else {
|
||||||
|
idlIdlExpected.push(this.enumExpected(data.keywords, data.nonCanon, data.invalidVal, idlTests[i]));
|
||||||
|
}
|
||||||
}
|
}
|
||||||
break;
|
break;
|
||||||
|
|
||||||
|
@ -687,7 +704,7 @@ ReflectionTests.doReflects = function(data, idlName, idlObj, domName, domObj) {
|
||||||
|
|
||||||
if (!data.customGetter) {
|
if (!data.customGetter) {
|
||||||
for (var i = 0; i < domTests.length; i++) {
|
for (var i = 0; i < domTests.length; i++) {
|
||||||
if (domExpected[i] === null) {
|
if (domExpected[i] === null && !data.isNullable) {
|
||||||
// If you follow all the complicated logic here, you'll find that
|
// If you follow all the complicated logic here, you'll find that
|
||||||
// this will only happen if there's no expected value at all (like
|
// this will only happen if there's no expected value at all (like
|
||||||
// for tabIndex, where the default is too complicated). So skip
|
// for tabIndex, where the default is too complicated). So skip
|
||||||
|
@ -723,10 +740,14 @@ ReflectionTests.doReflects = function(data, idlName, idlObj, domName, domObj) {
|
||||||
if (data.type == "boolean") {
|
if (data.type == "boolean") {
|
||||||
// Special case yay
|
// Special case yay
|
||||||
ReflectionHarness.test(domObj.hasAttribute(domName), Boolean(idlTests[i]), "IDL set to " + ReflectionHarness.stringRep(idlTests[i]) + " followed by hasAttribute()");
|
ReflectionHarness.test(domObj.hasAttribute(domName), Boolean(idlTests[i]), "IDL set to " + ReflectionHarness.stringRep(idlTests[i]) + " followed by hasAttribute()");
|
||||||
} else if (idlDomExpected[i] !== null) {
|
} else if (idlDomExpected[i] !== null || data.isNullable) {
|
||||||
ReflectionHarness.test(domObj.getAttribute(domName), idlDomExpected[i] + "", "IDL set to " + ReflectionHarness.stringRep(idlTests[i]) + " followed by getAttribute()");
|
var expected = idlDomExpected[i] + "";
|
||||||
|
if (data.isNullable && idlDomExpected[i] === null) {
|
||||||
|
expected = null;
|
||||||
|
}
|
||||||
|
ReflectionHarness.test(domObj.getAttribute(domName), expected, "IDL set to " + ReflectionHarness.stringRep(idlTests[i]) + " followed by getAttribute()");
|
||||||
}
|
}
|
||||||
if (idlIdlExpected[i] !== null) {
|
if (idlIdlExpected[i] !== null || data.isNullable) {
|
||||||
ReflectionHarness.test(idlObj[idlName], idlIdlExpected[i], "IDL set to " + ReflectionHarness.stringRep(idlTests[i]) + " followed by IDL get");
|
ReflectionHarness.test(idlObj[idlName], idlIdlExpected[i], "IDL set to " + ReflectionHarness.stringRep(idlTests[i]) + " followed by IDL get");
|
||||||
}
|
}
|
||||||
if (ReflectionHarness.catchUnexpectedExceptions) {
|
if (ReflectionHarness.catchUnexpectedExceptions) {
|
||||||
|
|
|
@ -0,0 +1,32 @@
|
||||||
|
<!doctype html>
|
||||||
|
<meta charset=utf-8>
|
||||||
|
<title>img update media</title>
|
||||||
|
<script src="/resources/testharness.js"></script>
|
||||||
|
<script src="/resources/testharnessreport.js"></script>
|
||||||
|
<script>
|
||||||
|
var t = async_test('set media after src updates selected image');
|
||||||
|
|
||||||
|
var img;
|
||||||
|
|
||||||
|
onload = t.step_func(function() {
|
||||||
|
img = document.querySelector('img');
|
||||||
|
img.addEventListener('load', t.step_func_done(onImgLoad));
|
||||||
|
|
||||||
|
var source = document.querySelector('source[data-media]');
|
||||||
|
source.setAttribute('media', source.getAttribute('data-media'));
|
||||||
|
});
|
||||||
|
|
||||||
|
function onImgLoad() {
|
||||||
|
img.removeEventListener('load', onImgLoad);
|
||||||
|
|
||||||
|
assert_true(img.currentSrc.indexOf(img.getAttribute('data-expect')) > -1);
|
||||||
|
}
|
||||||
|
|
||||||
|
</script>
|
||||||
|
|
||||||
|
<div id="log"></div>
|
||||||
|
<picture>
|
||||||
|
<source srcset="/images/fail.gif" data-media="(max-width: 1px)" />
|
||||||
|
<source srcset="/images/smiley.png" />
|
||||||
|
<img data-expect="/images/smiley.png">
|
||||||
|
</picture>
|
|
@ -42,6 +42,10 @@
|
||||||
input.value = " foo\rbar ";
|
input.value = " foo\rbar ";
|
||||||
});
|
});
|
||||||
assert_equals(input.value, "");
|
assert_equals(input.value, "");
|
||||||
|
} else if (types[j].type === "file") {
|
||||||
|
input.value = " foo\rbar ";
|
||||||
|
input.type = types[j].type; // change state
|
||||||
|
assert_equals(input.value, "");
|
||||||
} else {
|
} else {
|
||||||
input.value = " foo\rbar ";
|
input.value = " foo\rbar ";
|
||||||
input.type = types[j].type; // change state
|
input.type = types[j].type; // change state
|
||||||
|
|
|
@ -0,0 +1,18 @@
|
||||||
|
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0//EN">
|
||||||
|
<html>
|
||||||
|
<head>
|
||||||
|
<title>CSS Selectors (:checked)</title>
|
||||||
|
<link rel="author" title="Ian Hickson" href="mailto:ian@hixie.ch"/>
|
||||||
|
<link rel="alternate" href="http://www.hixie.ch/tests/adhoc/css/selectors/checked/001.html"/>
|
||||||
|
<style type="text/css">
|
||||||
|
:checked, :checked + span { border: solid blue; color: blue; background: navy; }
|
||||||
|
</style>
|
||||||
|
</head>
|
||||||
|
<body>
|
||||||
|
<p>Anything that is checked below should be blue.</p>
|
||||||
|
<p><input checked type="checkbox"> <span>X</span></p>
|
||||||
|
<p><input checked type="radio" name="x"> <span>X</span> <input checked type="radio" name="x"> <span>X</span></p>
|
||||||
|
<p><select><option selected>X</option></select></p>
|
||||||
|
<p><select size="2"><option selected>X</option></select></p>
|
||||||
|
</body>
|
||||||
|
</html>
|
|
@ -0,0 +1,26 @@
|
||||||
|
<!DOCTYPE HTML>
|
||||||
|
<meta charset="utf-8">
|
||||||
|
<title>:indeterminate and input type=radio</title>
|
||||||
|
<script src="/resources/testharness.js"></script>
|
||||||
|
<script src="/resources/testharnessreport.js"></script>
|
||||||
|
<style type="text/css">
|
||||||
|
#test {
|
||||||
|
color: green;
|
||||||
|
}
|
||||||
|
input:indeterminate + #test {
|
||||||
|
color: red;
|
||||||
|
}
|
||||||
|
</style>
|
||||||
|
<input type="radio" name="radios">
|
||||||
|
<div id="test"></div>
|
||||||
|
<input type="radio" name="radios" checked>
|
||||||
|
<script type="text/javascript">
|
||||||
|
test(function() {
|
||||||
|
document.getElementsByTagName("input")[0].indeterminate = true;
|
||||||
|
var target = document.getElementById("test");
|
||||||
|
var val = getComputedStyle(target, null).getPropertyValue("color");
|
||||||
|
assert_equals(val, "rgb(0, 128, 0)",
|
||||||
|
"The indeterminate IDL attribute should not cause the " +
|
||||||
|
":indeterminate pseudo-class to match on input type=radio");
|
||||||
|
})
|
||||||
|
</script>
|
24
tests/wpt/web-platform-tests/presentation-api/README.md
Normal file
24
tests/wpt/web-platform-tests/presentation-api/README.md
Normal file
|
@ -0,0 +1,24 @@
|
||||||
|
# Presentation API Tests
|
||||||
|
|
||||||
|
This test suite is currently tracking the [Editor Draft][editor-draft] of the Presentation API. The Presentation API describes the [conformance criteria for two classes of user agents][conformance-classes] ([controlling user agent][dfn-controlling-user-agent] and [receiving user agent][dfn-receiving-user-agent]). Each of the two subfolders [controlling-ua](./controlling-ua) and [receiving-ua](./receiving-ua) contains the Presentation API tests for each class of user agents.
|
||||||
|
|
||||||
|
## IDL Tests
|
||||||
|
|
||||||
|
Each of the [controlling-ua](./controlling-ua) and [receiving-ua](./receiving-ua) subfolders contains a file `idlharness.html` that defines IDL tests of the Presentation API for controlling and receiving user agents. The WebIDL of the Presentation API spec is extracted from the [Editor Draft][editor-draft] by running the following JavaScript code in the Dev. console of the Browser.
|
||||||
|
|
||||||
|
```javascript
|
||||||
|
(function(){
|
||||||
|
var s = "";
|
||||||
|
[].forEach.call(document.getElementsByClassName("idl"), function(idl) {
|
||||||
|
if (!idl.classList.contains("extract"))
|
||||||
|
s += idl.textContent + "\n\n";
|
||||||
|
});
|
||||||
|
document.body.innerHTML = '<pre></pre>';
|
||||||
|
document.body.firstChild.textContent = s;
|
||||||
|
})();
|
||||||
|
```
|
||||||
|
|
||||||
|
[editor-draft]: http://w3c.github.io/presentation-api/
|
||||||
|
[conformance-classes]: http://w3c.github.io/presentation-api/#conformance-classes
|
||||||
|
[dfn-controlling-user-agent]: http://w3c.github.io/presentation-api/#dfn-controlling-user-agent
|
||||||
|
[dfn-receiving-user-agent]: http://w3c.github.io/presentation-api/#dfn-receiving-user-agent
|
|
@ -0,0 +1,121 @@
|
||||||
|
<!DOCTYPE html>
|
||||||
|
<meta charset="utf-8">
|
||||||
|
<title>Presentation API IDL tests for Controlling User Agent</title>
|
||||||
|
<link rel="author" title="Louay Bassbouss" href="http://www.fokus.fraunhofer.de">
|
||||||
|
<link rel="help" href="http://w3c.github.io/presentation-api/#dfn-controlling-user-agent">
|
||||||
|
<script src="/resources/testharness.js"></script>
|
||||||
|
<script src="/resources/testharnessreport.js"></script>
|
||||||
|
<script src="/resources/WebIDLParser.js"></script>
|
||||||
|
<script src="/resources/idlharness.js"></script>
|
||||||
|
|
||||||
|
<script id="untested_idl" type="text/plain">
|
||||||
|
interface Navigator {
|
||||||
|
};
|
||||||
|
interface EventTarget {
|
||||||
|
};
|
||||||
|
interface EventHandler {
|
||||||
|
};
|
||||||
|
interface Event {
|
||||||
|
};
|
||||||
|
dictionary EventInit {
|
||||||
|
};
|
||||||
|
</script>
|
||||||
|
|
||||||
|
<script id='idl' type="text/plain">
|
||||||
|
partial interface Navigator {
|
||||||
|
[SameObject]
|
||||||
|
readonly attribute Presentation? presentation;
|
||||||
|
};
|
||||||
|
|
||||||
|
interface Presentation {
|
||||||
|
};
|
||||||
|
|
||||||
|
partial interface Presentation {
|
||||||
|
attribute PresentationRequest? defaultRequest;
|
||||||
|
};
|
||||||
|
|
||||||
|
[Constructor(DOMString url)]
|
||||||
|
interface PresentationRequest : EventTarget {
|
||||||
|
Promise<PresentationConnection> start();
|
||||||
|
Promise<PresentationConnection> reconnect(DOMString presentationId);
|
||||||
|
Promise<PresentationAvailability> getAvailability();
|
||||||
|
attribute EventHandler onconnectionavailable;
|
||||||
|
};
|
||||||
|
|
||||||
|
interface PresentationAvailability : EventTarget {
|
||||||
|
readonly attribute boolean value;
|
||||||
|
attribute EventHandler onchange;
|
||||||
|
};
|
||||||
|
|
||||||
|
[Constructor(DOMString type, PresentationConnectionAvailableEventInit eventInitDict)]
|
||||||
|
interface PresentationConnectionAvailableEvent : Event {
|
||||||
|
[SameObject]
|
||||||
|
readonly attribute PresentationConnection connection;
|
||||||
|
};
|
||||||
|
|
||||||
|
dictionary PresentationConnectionAvailableEventInit : EventInit {
|
||||||
|
required PresentationConnection connection;
|
||||||
|
};
|
||||||
|
|
||||||
|
enum PresentationConnectionState {
|
||||||
|
"connecting",
|
||||||
|
"connected",
|
||||||
|
"closed",
|
||||||
|
"terminated"
|
||||||
|
};
|
||||||
|
|
||||||
|
enum BinaryType {
|
||||||
|
"blob",
|
||||||
|
"arraybuffer"
|
||||||
|
};
|
||||||
|
|
||||||
|
interface PresentationConnection : EventTarget {
|
||||||
|
readonly attribute DOMString? id;
|
||||||
|
readonly attribute PresentationConnectionState state;
|
||||||
|
void close();
|
||||||
|
void terminate();
|
||||||
|
attribute EventHandler onconnect;
|
||||||
|
attribute EventHandler onclose;
|
||||||
|
attribute EventHandler onterminate;
|
||||||
|
// Communication
|
||||||
|
attribute BinaryType binaryType;
|
||||||
|
attribute EventHandler onmessage;
|
||||||
|
void send(DOMString message);
|
||||||
|
void send(Blob data);
|
||||||
|
void send(ArrayBuffer data);
|
||||||
|
void send(ArrayBufferView data);
|
||||||
|
};
|
||||||
|
|
||||||
|
enum PresentationConnectionClosedReason {
|
||||||
|
"error",
|
||||||
|
"closed",
|
||||||
|
"wentaway"
|
||||||
|
};
|
||||||
|
|
||||||
|
[Constructor(DOMString type, PresentationConnectionClosedEventInit eventInitDict)]
|
||||||
|
interface PresentationConnectionClosedEvent : Event {
|
||||||
|
readonly attribute PresentationConnectionClosedReason reason;
|
||||||
|
readonly attribute DOMString message;
|
||||||
|
};
|
||||||
|
|
||||||
|
dictionary PresentationConnectionClosedEventInit : EventInit {
|
||||||
|
required PresentationConnectionClosedReason reason;
|
||||||
|
DOMString message;
|
||||||
|
};
|
||||||
|
</script>
|
||||||
|
|
||||||
|
<script>
|
||||||
|
(function() {
|
||||||
|
"use strict";
|
||||||
|
var idl_array = new IdlArray();
|
||||||
|
var idls = document.getElementById('idl').textContent;
|
||||||
|
idl_array.add_untested_idls(document.getElementById('untested_idl').textContent);
|
||||||
|
idl_array.add_idls(idls);
|
||||||
|
idl_array.add_objects({
|
||||||
|
Presentation: ['navigator.presentation'],
|
||||||
|
PresentationRequest: ['navigator.presentation.defaultRequest', 'new PresentationRequest("/presentation-api/receiving-ua/idlharness.html")']
|
||||||
|
});
|
||||||
|
idl_array.test();
|
||||||
|
})();
|
||||||
|
</script>
|
||||||
|
|
|
@ -0,0 +1,119 @@
|
||||||
|
<!DOCTYPE html>
|
||||||
|
<meta charset="utf-8">
|
||||||
|
<title>Presentation API IDL tests for Receiving User Agent</title>
|
||||||
|
<link rel="author" title="Louay Bassbouss" href="http://www.fokus.fraunhofer.de">
|
||||||
|
<link rel="help" href="http://w3c.github.io/presentation-api/#dfn-receiving-user-agent">
|
||||||
|
<script src="/resources/testharness.js"></script>
|
||||||
|
<script src="/resources/testharnessreport.js"></script>
|
||||||
|
<script src="/resources/WebIDLParser.js"></script>
|
||||||
|
<script src="/resources/idlharness.js"></script>
|
||||||
|
|
||||||
|
<script id="untested_idl" type="text/plain">
|
||||||
|
interface Navigator {
|
||||||
|
};
|
||||||
|
interface EventTarget {
|
||||||
|
};
|
||||||
|
interface EventHandler {
|
||||||
|
};
|
||||||
|
interface Event {
|
||||||
|
};
|
||||||
|
dictionary EventInit {
|
||||||
|
};
|
||||||
|
</script>
|
||||||
|
|
||||||
|
<script id='idl' type="text/plain">
|
||||||
|
partial interface Navigator {
|
||||||
|
[SameObject]
|
||||||
|
readonly attribute Presentation? presentation;
|
||||||
|
};
|
||||||
|
|
||||||
|
interface Presentation {
|
||||||
|
};
|
||||||
|
|
||||||
|
partial interface Presentation {
|
||||||
|
[SameObject]
|
||||||
|
readonly attribute PresentationReceiver? receiver;
|
||||||
|
};
|
||||||
|
|
||||||
|
[Constructor(DOMString type, PresentationConnectionAvailableEventInit eventInitDict)]
|
||||||
|
interface PresentationConnectionAvailableEvent : Event {
|
||||||
|
[SameObject]
|
||||||
|
readonly attribute PresentationConnection connection;
|
||||||
|
};
|
||||||
|
|
||||||
|
dictionary PresentationConnectionAvailableEventInit : EventInit {
|
||||||
|
required PresentationConnection connection;
|
||||||
|
};
|
||||||
|
|
||||||
|
enum PresentationConnectionState {
|
||||||
|
"connecting",
|
||||||
|
"connected",
|
||||||
|
"closed",
|
||||||
|
"terminated"
|
||||||
|
};
|
||||||
|
|
||||||
|
enum BinaryType {
|
||||||
|
"blob",
|
||||||
|
"arraybuffer"
|
||||||
|
};
|
||||||
|
|
||||||
|
interface PresentationConnection : EventTarget {
|
||||||
|
readonly attribute DOMString? id;
|
||||||
|
readonly attribute PresentationConnectionState state;
|
||||||
|
void close();
|
||||||
|
void terminate();
|
||||||
|
attribute EventHandler onconnect;
|
||||||
|
attribute EventHandler onclose;
|
||||||
|
attribute EventHandler onterminate;
|
||||||
|
// Communication
|
||||||
|
attribute BinaryType binaryType;
|
||||||
|
attribute EventHandler onmessage;
|
||||||
|
void send(DOMString message);
|
||||||
|
void send(Blob data);
|
||||||
|
void send(ArrayBuffer data);
|
||||||
|
void send(ArrayBufferView data);
|
||||||
|
};
|
||||||
|
|
||||||
|
enum PresentationConnectionClosedReason {
|
||||||
|
"error",
|
||||||
|
"closed",
|
||||||
|
"wentaway"
|
||||||
|
};
|
||||||
|
|
||||||
|
[Constructor(DOMString type, PresentationConnectionClosedEventInit eventInitDict)]
|
||||||
|
interface PresentationConnectionClosedEvent : Event {
|
||||||
|
readonly attribute PresentationConnectionClosedReason reason;
|
||||||
|
readonly attribute DOMString message;
|
||||||
|
};
|
||||||
|
|
||||||
|
dictionary PresentationConnectionClosedEventInit : EventInit {
|
||||||
|
required PresentationConnectionClosedReason reason;
|
||||||
|
DOMString message;
|
||||||
|
};
|
||||||
|
|
||||||
|
interface PresentationReceiver {
|
||||||
|
[SameObject]
|
||||||
|
readonly attribute Promise<PresentationConnectionList> connectionList;
|
||||||
|
};
|
||||||
|
|
||||||
|
interface PresentationConnectionList : EventTarget {
|
||||||
|
readonly attribute FrozenArray<PresentationConnection> connections;
|
||||||
|
attribute EventHandler onconnectionavailable;
|
||||||
|
};
|
||||||
|
</script>
|
||||||
|
|
||||||
|
<script>
|
||||||
|
(function() {
|
||||||
|
"use strict";
|
||||||
|
var idl_array = new IdlArray();
|
||||||
|
var idls = document.getElementById('idl').textContent;
|
||||||
|
idl_array.add_untested_idls(document.getElementById('untested_idl').textContent);
|
||||||
|
idl_array.add_idls(idls);
|
||||||
|
idl_array.add_objects({
|
||||||
|
Presentation: ['navigator.presentation'],
|
||||||
|
PresentationReceiver: ['navigator.presentation.receiver']
|
||||||
|
});
|
||||||
|
idl_array.test();
|
||||||
|
})();
|
||||||
|
</script>
|
||||||
|
|
|
@ -19,21 +19,33 @@ function parseUrlQueryString(queryString) {
|
||||||
return params;
|
return params;
|
||||||
};
|
};
|
||||||
|
|
||||||
function appendIframeToBody(url) {
|
function appendIframeToBody(url, attributes) {
|
||||||
var iframe = document.createElement("iframe");
|
var iframe = document.createElement("iframe");
|
||||||
iframe.src = url;
|
iframe.src = url;
|
||||||
|
// Extend element with attributes. (E.g. "referrer_policy" or "rel")
|
||||||
|
if (attributes) {
|
||||||
|
for (var attr in attributes) {
|
||||||
|
iframe[attr] = attributes[attr];
|
||||||
|
}
|
||||||
|
}
|
||||||
document.body.appendChild(iframe);
|
document.body.appendChild(iframe);
|
||||||
|
|
||||||
return iframe;
|
return iframe;
|
||||||
}
|
}
|
||||||
|
|
||||||
function loadImage(src, callback) {
|
function loadImage(src, callback, attributes) {
|
||||||
var image = new Image();
|
var image = new Image();
|
||||||
image.crossOrigin = "Anonymous";
|
image.crossOrigin = "Anonymous";
|
||||||
image.onload = function() {
|
image.onload = function() {
|
||||||
callback(image);
|
callback(image);
|
||||||
}
|
}
|
||||||
image.src = src;
|
image.src = src;
|
||||||
|
// Extend element with attributes. (E.g. "referrer_policy" or "rel")
|
||||||
|
if (attributes) {
|
||||||
|
for (var attr in attributes) {
|
||||||
|
image[attr] = attributes[attr];
|
||||||
|
}
|
||||||
|
}
|
||||||
document.body.appendChild(image)
|
document.body.appendChild(image)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -61,14 +73,14 @@ function decodeImageData(rgba) {
|
||||||
return JSON.parse(string_data);
|
return JSON.parse(string_data);
|
||||||
}
|
}
|
||||||
|
|
||||||
function decodeImage(url, callback) {
|
function decodeImage(url, callback, referrer_policy) {
|
||||||
loadImage(url, function(img) {
|
loadImage(url, function(img) {
|
||||||
var canvas = document.createElement("canvas");
|
var canvas = document.createElement("canvas");
|
||||||
var context = canvas.getContext('2d');
|
var context = canvas.getContext('2d');
|
||||||
context.drawImage(img, 0, 0);
|
context.drawImage(img, 0, 0);
|
||||||
var imgData = context.getImageData(0, 0, img.clientWidth, img.clientHeight);
|
var imgData = context.getImageData(0, 0, img.clientWidth, img.clientHeight);
|
||||||
callback(decodeImageData(imgData.data))
|
callback(decodeImageData(imgData.data))
|
||||||
});
|
}, referrer_policy);
|
||||||
}
|
}
|
||||||
|
|
||||||
function normalizePort(targetPort) {
|
function normalizePort(targetPort) {
|
||||||
|
@ -87,8 +99,8 @@ function wrapResult(url, server_data) {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
function queryIframe(url, callback) {
|
function queryIframe(url, callback, referrer_policy) {
|
||||||
var iframe = appendIframeToBody(url);
|
var iframe = appendIframeToBody(url, referrer_policy);
|
||||||
var listener = function(event) {
|
var listener = function(event) {
|
||||||
if (event.source != iframe.contentWindow)
|
if (event.source != iframe.contentWindow)
|
||||||
return;
|
return;
|
||||||
|
@ -99,10 +111,10 @@ function queryIframe(url, callback) {
|
||||||
window.addEventListener("message", listener);
|
window.addEventListener("message", listener);
|
||||||
}
|
}
|
||||||
|
|
||||||
function queryImage(url, callback) {
|
function queryImage(url, callback, referrer_policy) {
|
||||||
decodeImage(url, function(server_data) {
|
decodeImage(url, function(server_data) {
|
||||||
callback(wrapResult(url, server_data), url);
|
callback(wrapResult(url, server_data), url);
|
||||||
})
|
}, referrer_policy)
|
||||||
}
|
}
|
||||||
|
|
||||||
function queryXhr(url, callback) {
|
function queryXhr(url, callback) {
|
||||||
|
|
|
@ -76,7 +76,7 @@ function ReferrerPolicyTestCase(scenario, testDescription, sanityChecker) {
|
||||||
// Depending on the delivery method, extend the subresource element with
|
// Depending on the delivery method, extend the subresource element with
|
||||||
// these attributes.
|
// these attributes.
|
||||||
var elementAttributesForDeliveryMethod = {
|
var elementAttributesForDeliveryMethod = {
|
||||||
"attr-referrer": {referrer: t._scenario.referrer_policy},
|
"attr-referrer": {referrerpolicy: t._scenario.referrer_policy},
|
||||||
"rel-noreferrer": {rel: "noreferrer"}
|
"rel-noreferrer": {rel: "noreferrer"}
|
||||||
};
|
};
|
||||||
|
|
||||||
|
|
|
@ -0,0 +1,25 @@
|
||||||
|
<!DOCTYPE html>
|
||||||
|
<html>
|
||||||
|
<head>
|
||||||
|
<title>Invalid referrerpolicy attribute value</title>
|
||||||
|
<script src="/resources/testharness.js"></script>
|
||||||
|
<script src="/resources/testharnessreport.js"></script>
|
||||||
|
</head>
|
||||||
|
<body>
|
||||||
|
<h1>Invalid referrerpolicy attribute value</h1>
|
||||||
|
<pre>Running...</pre>
|
||||||
|
|
||||||
|
<script>
|
||||||
|
test(function () {
|
||||||
|
var elements = ["iframe", "img", "a", "area"];
|
||||||
|
for (var i = 0; i < elements.length; i++) {
|
||||||
|
var elem = document.createElement(elements[i]);
|
||||||
|
elem.referrerpolicy = "unsafe-url";
|
||||||
|
assert_equals(elem.referrerpolicy, "unsafe-url");
|
||||||
|
elem.referrerpolicy = "not-valid-value";
|
||||||
|
assert_equals(elem.referrerpolicy, "");
|
||||||
|
}
|
||||||
|
}, "Invalid referrerpolicy values not reflected");
|
||||||
|
</script>
|
||||||
|
</body>
|
||||||
|
</html>
|
|
@ -0,0 +1,40 @@
|
||||||
|
<!DOCTYPE html>
|
||||||
|
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||||
|
<html>
|
||||||
|
<head>
|
||||||
|
<title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
|
||||||
|
<meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
|
||||||
|
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||||
|
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-no-referrer-when-downgrade">
|
||||||
|
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||||
|
document served over http requires an http
|
||||||
|
sub-resource via iframe-tag using the attr-referrer
|
||||||
|
delivery method with keep-origin-redirect and when
|
||||||
|
the target request is cross-origin.">
|
||||||
|
<script src="/resources/testharness.js"></script>
|
||||||
|
<script src="/resources/testharnessreport.js"></script>
|
||||||
|
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||||
|
<script src="/referrer-policy/generic/common.js"></script>
|
||||||
|
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||||
|
</head>
|
||||||
|
<body>
|
||||||
|
<script>
|
||||||
|
ReferrerPolicyTestCase(
|
||||||
|
{
|
||||||
|
"referrer_policy": "no-referrer-when-downgrade",
|
||||||
|
"delivery_method": "attr-referrer",
|
||||||
|
"redirection": "keep-origin-redirect",
|
||||||
|
"origin": "cross-origin",
|
||||||
|
"source_protocol": "http",
|
||||||
|
"target_protocol": "http",
|
||||||
|
"subresource": "iframe-tag",
|
||||||
|
"subresource_path": "/referrer-policy/generic/subresource/document.py",
|
||||||
|
"referrer_url": "stripped-referrer"
|
||||||
|
},
|
||||||
|
document.querySelector("meta[name=assert]").content,
|
||||||
|
new SanityChecker()
|
||||||
|
).start();
|
||||||
|
</script>
|
||||||
|
<div id="log"></div>
|
||||||
|
</body>
|
||||||
|
</html>
|
|
@ -0,0 +1,40 @@
|
||||||
|
<!DOCTYPE html>
|
||||||
|
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||||
|
<html>
|
||||||
|
<head>
|
||||||
|
<title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
|
||||||
|
<meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
|
||||||
|
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||||
|
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-no-referrer-when-downgrade">
|
||||||
|
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||||
|
document served over http requires an http
|
||||||
|
sub-resource via iframe-tag using the attr-referrer
|
||||||
|
delivery method with no-redirect and when
|
||||||
|
the target request is cross-origin.">
|
||||||
|
<script src="/resources/testharness.js"></script>
|
||||||
|
<script src="/resources/testharnessreport.js"></script>
|
||||||
|
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||||
|
<script src="/referrer-policy/generic/common.js"></script>
|
||||||
|
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||||
|
</head>
|
||||||
|
<body>
|
||||||
|
<script>
|
||||||
|
ReferrerPolicyTestCase(
|
||||||
|
{
|
||||||
|
"referrer_policy": "no-referrer-when-downgrade",
|
||||||
|
"delivery_method": "attr-referrer",
|
||||||
|
"redirection": "no-redirect",
|
||||||
|
"origin": "cross-origin",
|
||||||
|
"source_protocol": "http",
|
||||||
|
"target_protocol": "http",
|
||||||
|
"subresource": "iframe-tag",
|
||||||
|
"subresource_path": "/referrer-policy/generic/subresource/document.py",
|
||||||
|
"referrer_url": "stripped-referrer"
|
||||||
|
},
|
||||||
|
document.querySelector("meta[name=assert]").content,
|
||||||
|
new SanityChecker()
|
||||||
|
).start();
|
||||||
|
</script>
|
||||||
|
<div id="log"></div>
|
||||||
|
</body>
|
||||||
|
</html>
|
|
@ -0,0 +1,40 @@
|
||||||
|
<!DOCTYPE html>
|
||||||
|
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||||
|
<html>
|
||||||
|
<head>
|
||||||
|
<title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
|
||||||
|
<meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
|
||||||
|
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||||
|
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-no-referrer-when-downgrade">
|
||||||
|
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||||
|
document served over http requires an http
|
||||||
|
sub-resource via iframe-tag using the attr-referrer
|
||||||
|
delivery method with swap-origin-redirect and when
|
||||||
|
the target request is cross-origin.">
|
||||||
|
<script src="/resources/testharness.js"></script>
|
||||||
|
<script src="/resources/testharnessreport.js"></script>
|
||||||
|
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||||
|
<script src="/referrer-policy/generic/common.js"></script>
|
||||||
|
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||||
|
</head>
|
||||||
|
<body>
|
||||||
|
<script>
|
||||||
|
ReferrerPolicyTestCase(
|
||||||
|
{
|
||||||
|
"referrer_policy": "no-referrer-when-downgrade",
|
||||||
|
"delivery_method": "attr-referrer",
|
||||||
|
"redirection": "swap-origin-redirect",
|
||||||
|
"origin": "cross-origin",
|
||||||
|
"source_protocol": "http",
|
||||||
|
"target_protocol": "http",
|
||||||
|
"subresource": "iframe-tag",
|
||||||
|
"subresource_path": "/referrer-policy/generic/subresource/document.py",
|
||||||
|
"referrer_url": "stripped-referrer"
|
||||||
|
},
|
||||||
|
document.querySelector("meta[name=assert]").content,
|
||||||
|
new SanityChecker()
|
||||||
|
).start();
|
||||||
|
</script>
|
||||||
|
<div id="log"></div>
|
||||||
|
</body>
|
||||||
|
</html>
|
|
@ -0,0 +1,40 @@
|
||||||
|
<!DOCTYPE html>
|
||||||
|
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||||
|
<html>
|
||||||
|
<head>
|
||||||
|
<title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
|
||||||
|
<meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
|
||||||
|
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||||
|
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-no-referrer-when-downgrade">
|
||||||
|
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||||
|
document served over http requires an http
|
||||||
|
sub-resource via img-tag using the attr-referrer
|
||||||
|
delivery method with keep-origin-redirect and when
|
||||||
|
the target request is cross-origin.">
|
||||||
|
<script src="/resources/testharness.js"></script>
|
||||||
|
<script src="/resources/testharnessreport.js"></script>
|
||||||
|
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||||
|
<script src="/referrer-policy/generic/common.js"></script>
|
||||||
|
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||||
|
</head>
|
||||||
|
<body>
|
||||||
|
<script>
|
||||||
|
ReferrerPolicyTestCase(
|
||||||
|
{
|
||||||
|
"referrer_policy": "no-referrer-when-downgrade",
|
||||||
|
"delivery_method": "attr-referrer",
|
||||||
|
"redirection": "keep-origin-redirect",
|
||||||
|
"origin": "cross-origin",
|
||||||
|
"source_protocol": "http",
|
||||||
|
"target_protocol": "http",
|
||||||
|
"subresource": "img-tag",
|
||||||
|
"subresource_path": "/referrer-policy/generic/subresource/image.py",
|
||||||
|
"referrer_url": "stripped-referrer"
|
||||||
|
},
|
||||||
|
document.querySelector("meta[name=assert]").content,
|
||||||
|
new SanityChecker()
|
||||||
|
).start();
|
||||||
|
</script>
|
||||||
|
<div id="log"></div>
|
||||||
|
</body>
|
||||||
|
</html>
|
|
@ -0,0 +1,40 @@
|
||||||
|
<!DOCTYPE html>
|
||||||
|
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||||
|
<html>
|
||||||
|
<head>
|
||||||
|
<title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
|
||||||
|
<meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
|
||||||
|
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||||
|
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-no-referrer-when-downgrade">
|
||||||
|
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||||
|
document served over http requires an http
|
||||||
|
sub-resource via img-tag using the attr-referrer
|
||||||
|
delivery method with no-redirect and when
|
||||||
|
the target request is cross-origin.">
|
||||||
|
<script src="/resources/testharness.js"></script>
|
||||||
|
<script src="/resources/testharnessreport.js"></script>
|
||||||
|
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||||
|
<script src="/referrer-policy/generic/common.js"></script>
|
||||||
|
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||||
|
</head>
|
||||||
|
<body>
|
||||||
|
<script>
|
||||||
|
ReferrerPolicyTestCase(
|
||||||
|
{
|
||||||
|
"referrer_policy": "no-referrer-when-downgrade",
|
||||||
|
"delivery_method": "attr-referrer",
|
||||||
|
"redirection": "no-redirect",
|
||||||
|
"origin": "cross-origin",
|
||||||
|
"source_protocol": "http",
|
||||||
|
"target_protocol": "http",
|
||||||
|
"subresource": "img-tag",
|
||||||
|
"subresource_path": "/referrer-policy/generic/subresource/image.py",
|
||||||
|
"referrer_url": "stripped-referrer"
|
||||||
|
},
|
||||||
|
document.querySelector("meta[name=assert]").content,
|
||||||
|
new SanityChecker()
|
||||||
|
).start();
|
||||||
|
</script>
|
||||||
|
<div id="log"></div>
|
||||||
|
</body>
|
||||||
|
</html>
|
|
@ -0,0 +1,40 @@
|
||||||
|
<!DOCTYPE html>
|
||||||
|
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||||
|
<html>
|
||||||
|
<head>
|
||||||
|
<title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
|
||||||
|
<meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
|
||||||
|
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||||
|
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-no-referrer-when-downgrade">
|
||||||
|
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||||
|
document served over http requires an http
|
||||||
|
sub-resource via img-tag using the attr-referrer
|
||||||
|
delivery method with swap-origin-redirect and when
|
||||||
|
the target request is cross-origin.">
|
||||||
|
<script src="/resources/testharness.js"></script>
|
||||||
|
<script src="/resources/testharnessreport.js"></script>
|
||||||
|
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||||
|
<script src="/referrer-policy/generic/common.js"></script>
|
||||||
|
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||||
|
</head>
|
||||||
|
<body>
|
||||||
|
<script>
|
||||||
|
ReferrerPolicyTestCase(
|
||||||
|
{
|
||||||
|
"referrer_policy": "no-referrer-when-downgrade",
|
||||||
|
"delivery_method": "attr-referrer",
|
||||||
|
"redirection": "swap-origin-redirect",
|
||||||
|
"origin": "cross-origin",
|
||||||
|
"source_protocol": "http",
|
||||||
|
"target_protocol": "http",
|
||||||
|
"subresource": "img-tag",
|
||||||
|
"subresource_path": "/referrer-policy/generic/subresource/image.py",
|
||||||
|
"referrer_url": "stripped-referrer"
|
||||||
|
},
|
||||||
|
document.querySelector("meta[name=assert]").content,
|
||||||
|
new SanityChecker()
|
||||||
|
).start();
|
||||||
|
</script>
|
||||||
|
<div id="log"></div>
|
||||||
|
</body>
|
||||||
|
</html>
|
|
@ -0,0 +1,40 @@
|
||||||
|
<!DOCTYPE html>
|
||||||
|
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||||
|
<html>
|
||||||
|
<head>
|
||||||
|
<title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
|
||||||
|
<meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
|
||||||
|
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||||
|
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-no-referrer-when-downgrade">
|
||||||
|
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||||
|
document served over http requires an https
|
||||||
|
sub-resource via iframe-tag using the attr-referrer
|
||||||
|
delivery method with keep-origin-redirect and when
|
||||||
|
the target request is cross-origin.">
|
||||||
|
<script src="/resources/testharness.js"></script>
|
||||||
|
<script src="/resources/testharnessreport.js"></script>
|
||||||
|
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||||
|
<script src="/referrer-policy/generic/common.js"></script>
|
||||||
|
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||||
|
</head>
|
||||||
|
<body>
|
||||||
|
<script>
|
||||||
|
ReferrerPolicyTestCase(
|
||||||
|
{
|
||||||
|
"referrer_policy": "no-referrer-when-downgrade",
|
||||||
|
"delivery_method": "attr-referrer",
|
||||||
|
"redirection": "keep-origin-redirect",
|
||||||
|
"origin": "cross-origin",
|
||||||
|
"source_protocol": "http",
|
||||||
|
"target_protocol": "https",
|
||||||
|
"subresource": "iframe-tag",
|
||||||
|
"subresource_path": "/referrer-policy/generic/subresource/document.py",
|
||||||
|
"referrer_url": "stripped-referrer"
|
||||||
|
},
|
||||||
|
document.querySelector("meta[name=assert]").content,
|
||||||
|
new SanityChecker()
|
||||||
|
).start();
|
||||||
|
</script>
|
||||||
|
<div id="log"></div>
|
||||||
|
</body>
|
||||||
|
</html>
|
|
@ -0,0 +1,40 @@
|
||||||
|
<!DOCTYPE html>
|
||||||
|
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||||
|
<html>
|
||||||
|
<head>
|
||||||
|
<title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
|
||||||
|
<meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
|
||||||
|
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||||
|
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-no-referrer-when-downgrade">
|
||||||
|
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||||
|
document served over http requires an https
|
||||||
|
sub-resource via iframe-tag using the attr-referrer
|
||||||
|
delivery method with no-redirect and when
|
||||||
|
the target request is cross-origin.">
|
||||||
|
<script src="/resources/testharness.js"></script>
|
||||||
|
<script src="/resources/testharnessreport.js"></script>
|
||||||
|
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||||
|
<script src="/referrer-policy/generic/common.js"></script>
|
||||||
|
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||||
|
</head>
|
||||||
|
<body>
|
||||||
|
<script>
|
||||||
|
ReferrerPolicyTestCase(
|
||||||
|
{
|
||||||
|
"referrer_policy": "no-referrer-when-downgrade",
|
||||||
|
"delivery_method": "attr-referrer",
|
||||||
|
"redirection": "no-redirect",
|
||||||
|
"origin": "cross-origin",
|
||||||
|
"source_protocol": "http",
|
||||||
|
"target_protocol": "https",
|
||||||
|
"subresource": "iframe-tag",
|
||||||
|
"subresource_path": "/referrer-policy/generic/subresource/document.py",
|
||||||
|
"referrer_url": "stripped-referrer"
|
||||||
|
},
|
||||||
|
document.querySelector("meta[name=assert]").content,
|
||||||
|
new SanityChecker()
|
||||||
|
).start();
|
||||||
|
</script>
|
||||||
|
<div id="log"></div>
|
||||||
|
</body>
|
||||||
|
</html>
|
|
@ -0,0 +1,40 @@
|
||||||
|
<!DOCTYPE html>
|
||||||
|
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||||
|
<html>
|
||||||
|
<head>
|
||||||
|
<title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
|
||||||
|
<meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
|
||||||
|
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||||
|
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-no-referrer-when-downgrade">
|
||||||
|
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||||
|
document served over http requires an https
|
||||||
|
sub-resource via iframe-tag using the attr-referrer
|
||||||
|
delivery method with swap-origin-redirect and when
|
||||||
|
the target request is cross-origin.">
|
||||||
|
<script src="/resources/testharness.js"></script>
|
||||||
|
<script src="/resources/testharnessreport.js"></script>
|
||||||
|
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||||
|
<script src="/referrer-policy/generic/common.js"></script>
|
||||||
|
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||||
|
</head>
|
||||||
|
<body>
|
||||||
|
<script>
|
||||||
|
ReferrerPolicyTestCase(
|
||||||
|
{
|
||||||
|
"referrer_policy": "no-referrer-when-downgrade",
|
||||||
|
"delivery_method": "attr-referrer",
|
||||||
|
"redirection": "swap-origin-redirect",
|
||||||
|
"origin": "cross-origin",
|
||||||
|
"source_protocol": "http",
|
||||||
|
"target_protocol": "https",
|
||||||
|
"subresource": "iframe-tag",
|
||||||
|
"subresource_path": "/referrer-policy/generic/subresource/document.py",
|
||||||
|
"referrer_url": "stripped-referrer"
|
||||||
|
},
|
||||||
|
document.querySelector("meta[name=assert]").content,
|
||||||
|
new SanityChecker()
|
||||||
|
).start();
|
||||||
|
</script>
|
||||||
|
<div id="log"></div>
|
||||||
|
</body>
|
||||||
|
</html>
|
|
@ -0,0 +1,40 @@
|
||||||
|
<!DOCTYPE html>
|
||||||
|
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||||
|
<html>
|
||||||
|
<head>
|
||||||
|
<title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
|
||||||
|
<meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
|
||||||
|
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||||
|
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-no-referrer-when-downgrade">
|
||||||
|
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||||
|
document served over http requires an https
|
||||||
|
sub-resource via img-tag using the attr-referrer
|
||||||
|
delivery method with keep-origin-redirect and when
|
||||||
|
the target request is cross-origin.">
|
||||||
|
<script src="/resources/testharness.js"></script>
|
||||||
|
<script src="/resources/testharnessreport.js"></script>
|
||||||
|
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||||
|
<script src="/referrer-policy/generic/common.js"></script>
|
||||||
|
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||||
|
</head>
|
||||||
|
<body>
|
||||||
|
<script>
|
||||||
|
ReferrerPolicyTestCase(
|
||||||
|
{
|
||||||
|
"referrer_policy": "no-referrer-when-downgrade",
|
||||||
|
"delivery_method": "attr-referrer",
|
||||||
|
"redirection": "keep-origin-redirect",
|
||||||
|
"origin": "cross-origin",
|
||||||
|
"source_protocol": "http",
|
||||||
|
"target_protocol": "https",
|
||||||
|
"subresource": "img-tag",
|
||||||
|
"subresource_path": "/referrer-policy/generic/subresource/image.py",
|
||||||
|
"referrer_url": "stripped-referrer"
|
||||||
|
},
|
||||||
|
document.querySelector("meta[name=assert]").content,
|
||||||
|
new SanityChecker()
|
||||||
|
).start();
|
||||||
|
</script>
|
||||||
|
<div id="log"></div>
|
||||||
|
</body>
|
||||||
|
</html>
|
|
@ -0,0 +1,40 @@
|
||||||
|
<!DOCTYPE html>
|
||||||
|
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||||
|
<html>
|
||||||
|
<head>
|
||||||
|
<title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
|
||||||
|
<meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
|
||||||
|
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||||
|
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-no-referrer-when-downgrade">
|
||||||
|
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||||
|
document served over http requires an https
|
||||||
|
sub-resource via img-tag using the attr-referrer
|
||||||
|
delivery method with no-redirect and when
|
||||||
|
the target request is cross-origin.">
|
||||||
|
<script src="/resources/testharness.js"></script>
|
||||||
|
<script src="/resources/testharnessreport.js"></script>
|
||||||
|
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||||
|
<script src="/referrer-policy/generic/common.js"></script>
|
||||||
|
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||||
|
</head>
|
||||||
|
<body>
|
||||||
|
<script>
|
||||||
|
ReferrerPolicyTestCase(
|
||||||
|
{
|
||||||
|
"referrer_policy": "no-referrer-when-downgrade",
|
||||||
|
"delivery_method": "attr-referrer",
|
||||||
|
"redirection": "no-redirect",
|
||||||
|
"origin": "cross-origin",
|
||||||
|
"source_protocol": "http",
|
||||||
|
"target_protocol": "https",
|
||||||
|
"subresource": "img-tag",
|
||||||
|
"subresource_path": "/referrer-policy/generic/subresource/image.py",
|
||||||
|
"referrer_url": "stripped-referrer"
|
||||||
|
},
|
||||||
|
document.querySelector("meta[name=assert]").content,
|
||||||
|
new SanityChecker()
|
||||||
|
).start();
|
||||||
|
</script>
|
||||||
|
<div id="log"></div>
|
||||||
|
</body>
|
||||||
|
</html>
|
|
@ -0,0 +1,40 @@
|
||||||
|
<!DOCTYPE html>
|
||||||
|
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||||
|
<html>
|
||||||
|
<head>
|
||||||
|
<title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
|
||||||
|
<meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
|
||||||
|
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||||
|
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-no-referrer-when-downgrade">
|
||||||
|
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||||
|
document served over http requires an https
|
||||||
|
sub-resource via img-tag using the attr-referrer
|
||||||
|
delivery method with swap-origin-redirect and when
|
||||||
|
the target request is cross-origin.">
|
||||||
|
<script src="/resources/testharness.js"></script>
|
||||||
|
<script src="/resources/testharnessreport.js"></script>
|
||||||
|
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||||
|
<script src="/referrer-policy/generic/common.js"></script>
|
||||||
|
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||||
|
</head>
|
||||||
|
<body>
|
||||||
|
<script>
|
||||||
|
ReferrerPolicyTestCase(
|
||||||
|
{
|
||||||
|
"referrer_policy": "no-referrer-when-downgrade",
|
||||||
|
"delivery_method": "attr-referrer",
|
||||||
|
"redirection": "swap-origin-redirect",
|
||||||
|
"origin": "cross-origin",
|
||||||
|
"source_protocol": "http",
|
||||||
|
"target_protocol": "https",
|
||||||
|
"subresource": "img-tag",
|
||||||
|
"subresource_path": "/referrer-policy/generic/subresource/image.py",
|
||||||
|
"referrer_url": "stripped-referrer"
|
||||||
|
},
|
||||||
|
document.querySelector("meta[name=assert]").content,
|
||||||
|
new SanityChecker()
|
||||||
|
).start();
|
||||||
|
</script>
|
||||||
|
<div id="log"></div>
|
||||||
|
</body>
|
||||||
|
</html>
|
|
@ -0,0 +1,40 @@
|
||||||
|
<!DOCTYPE html>
|
||||||
|
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||||
|
<html>
|
||||||
|
<head>
|
||||||
|
<title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
|
||||||
|
<meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
|
||||||
|
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||||
|
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-no-referrer-when-downgrade">
|
||||||
|
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||||
|
document served over http requires an http
|
||||||
|
sub-resource via iframe-tag using the attr-referrer
|
||||||
|
delivery method with keep-origin-redirect and when
|
||||||
|
the target request is same-origin.">
|
||||||
|
<script src="/resources/testharness.js"></script>
|
||||||
|
<script src="/resources/testharnessreport.js"></script>
|
||||||
|
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||||
|
<script src="/referrer-policy/generic/common.js"></script>
|
||||||
|
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||||
|
</head>
|
||||||
|
<body>
|
||||||
|
<script>
|
||||||
|
ReferrerPolicyTestCase(
|
||||||
|
{
|
||||||
|
"referrer_policy": "no-referrer-when-downgrade",
|
||||||
|
"delivery_method": "attr-referrer",
|
||||||
|
"redirection": "keep-origin-redirect",
|
||||||
|
"origin": "same-origin",
|
||||||
|
"source_protocol": "http",
|
||||||
|
"target_protocol": "http",
|
||||||
|
"subresource": "iframe-tag",
|
||||||
|
"subresource_path": "/referrer-policy/generic/subresource/document.py",
|
||||||
|
"referrer_url": "stripped-referrer"
|
||||||
|
},
|
||||||
|
document.querySelector("meta[name=assert]").content,
|
||||||
|
new SanityChecker()
|
||||||
|
).start();
|
||||||
|
</script>
|
||||||
|
<div id="log"></div>
|
||||||
|
</body>
|
||||||
|
</html>
|
|
@ -0,0 +1,40 @@
|
||||||
|
<!DOCTYPE html>
|
||||||
|
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||||
|
<html>
|
||||||
|
<head>
|
||||||
|
<title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
|
||||||
|
<meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
|
||||||
|
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||||
|
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-no-referrer-when-downgrade">
|
||||||
|
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||||
|
document served over http requires an http
|
||||||
|
sub-resource via iframe-tag using the attr-referrer
|
||||||
|
delivery method with no-redirect and when
|
||||||
|
the target request is same-origin.">
|
||||||
|
<script src="/resources/testharness.js"></script>
|
||||||
|
<script src="/resources/testharnessreport.js"></script>
|
||||||
|
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||||
|
<script src="/referrer-policy/generic/common.js"></script>
|
||||||
|
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||||
|
</head>
|
||||||
|
<body>
|
||||||
|
<script>
|
||||||
|
ReferrerPolicyTestCase(
|
||||||
|
{
|
||||||
|
"referrer_policy": "no-referrer-when-downgrade",
|
||||||
|
"delivery_method": "attr-referrer",
|
||||||
|
"redirection": "no-redirect",
|
||||||
|
"origin": "same-origin",
|
||||||
|
"source_protocol": "http",
|
||||||
|
"target_protocol": "http",
|
||||||
|
"subresource": "iframe-tag",
|
||||||
|
"subresource_path": "/referrer-policy/generic/subresource/document.py",
|
||||||
|
"referrer_url": "stripped-referrer"
|
||||||
|
},
|
||||||
|
document.querySelector("meta[name=assert]").content,
|
||||||
|
new SanityChecker()
|
||||||
|
).start();
|
||||||
|
</script>
|
||||||
|
<div id="log"></div>
|
||||||
|
</body>
|
||||||
|
</html>
|
|
@ -0,0 +1,40 @@
|
||||||
|
<!DOCTYPE html>
|
||||||
|
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||||
|
<html>
|
||||||
|
<head>
|
||||||
|
<title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
|
||||||
|
<meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
|
||||||
|
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||||
|
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-no-referrer-when-downgrade">
|
||||||
|
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||||
|
document served over http requires an http
|
||||||
|
sub-resource via iframe-tag using the attr-referrer
|
||||||
|
delivery method with swap-origin-redirect and when
|
||||||
|
the target request is same-origin.">
|
||||||
|
<script src="/resources/testharness.js"></script>
|
||||||
|
<script src="/resources/testharnessreport.js"></script>
|
||||||
|
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||||
|
<script src="/referrer-policy/generic/common.js"></script>
|
||||||
|
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||||
|
</head>
|
||||||
|
<body>
|
||||||
|
<script>
|
||||||
|
ReferrerPolicyTestCase(
|
||||||
|
{
|
||||||
|
"referrer_policy": "no-referrer-when-downgrade",
|
||||||
|
"delivery_method": "attr-referrer",
|
||||||
|
"redirection": "swap-origin-redirect",
|
||||||
|
"origin": "same-origin",
|
||||||
|
"source_protocol": "http",
|
||||||
|
"target_protocol": "http",
|
||||||
|
"subresource": "iframe-tag",
|
||||||
|
"subresource_path": "/referrer-policy/generic/subresource/document.py",
|
||||||
|
"referrer_url": "stripped-referrer"
|
||||||
|
},
|
||||||
|
document.querySelector("meta[name=assert]").content,
|
||||||
|
new SanityChecker()
|
||||||
|
).start();
|
||||||
|
</script>
|
||||||
|
<div id="log"></div>
|
||||||
|
</body>
|
||||||
|
</html>
|
|
@ -0,0 +1,40 @@
|
||||||
|
<!DOCTYPE html>
|
||||||
|
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||||
|
<html>
|
||||||
|
<head>
|
||||||
|
<title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
|
||||||
|
<meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
|
||||||
|
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||||
|
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-no-referrer-when-downgrade">
|
||||||
|
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||||
|
document served over http requires an http
|
||||||
|
sub-resource via img-tag using the attr-referrer
|
||||||
|
delivery method with keep-origin-redirect and when
|
||||||
|
the target request is same-origin.">
|
||||||
|
<script src="/resources/testharness.js"></script>
|
||||||
|
<script src="/resources/testharnessreport.js"></script>
|
||||||
|
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||||
|
<script src="/referrer-policy/generic/common.js"></script>
|
||||||
|
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||||
|
</head>
|
||||||
|
<body>
|
||||||
|
<script>
|
||||||
|
ReferrerPolicyTestCase(
|
||||||
|
{
|
||||||
|
"referrer_policy": "no-referrer-when-downgrade",
|
||||||
|
"delivery_method": "attr-referrer",
|
||||||
|
"redirection": "keep-origin-redirect",
|
||||||
|
"origin": "same-origin",
|
||||||
|
"source_protocol": "http",
|
||||||
|
"target_protocol": "http",
|
||||||
|
"subresource": "img-tag",
|
||||||
|
"subresource_path": "/referrer-policy/generic/subresource/image.py",
|
||||||
|
"referrer_url": "stripped-referrer"
|
||||||
|
},
|
||||||
|
document.querySelector("meta[name=assert]").content,
|
||||||
|
new SanityChecker()
|
||||||
|
).start();
|
||||||
|
</script>
|
||||||
|
<div id="log"></div>
|
||||||
|
</body>
|
||||||
|
</html>
|
|
@ -0,0 +1,40 @@
|
||||||
|
<!DOCTYPE html>
|
||||||
|
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||||
|
<html>
|
||||||
|
<head>
|
||||||
|
<title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
|
||||||
|
<meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
|
||||||
|
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||||
|
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-no-referrer-when-downgrade">
|
||||||
|
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||||
|
document served over http requires an http
|
||||||
|
sub-resource via img-tag using the attr-referrer
|
||||||
|
delivery method with no-redirect and when
|
||||||
|
the target request is same-origin.">
|
||||||
|
<script src="/resources/testharness.js"></script>
|
||||||
|
<script src="/resources/testharnessreport.js"></script>
|
||||||
|
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||||
|
<script src="/referrer-policy/generic/common.js"></script>
|
||||||
|
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||||
|
</head>
|
||||||
|
<body>
|
||||||
|
<script>
|
||||||
|
ReferrerPolicyTestCase(
|
||||||
|
{
|
||||||
|
"referrer_policy": "no-referrer-when-downgrade",
|
||||||
|
"delivery_method": "attr-referrer",
|
||||||
|
"redirection": "no-redirect",
|
||||||
|
"origin": "same-origin",
|
||||||
|
"source_protocol": "http",
|
||||||
|
"target_protocol": "http",
|
||||||
|
"subresource": "img-tag",
|
||||||
|
"subresource_path": "/referrer-policy/generic/subresource/image.py",
|
||||||
|
"referrer_url": "stripped-referrer"
|
||||||
|
},
|
||||||
|
document.querySelector("meta[name=assert]").content,
|
||||||
|
new SanityChecker()
|
||||||
|
).start();
|
||||||
|
</script>
|
||||||
|
<div id="log"></div>
|
||||||
|
</body>
|
||||||
|
</html>
|
|
@ -0,0 +1,40 @@
|
||||||
|
<!DOCTYPE html>
|
||||||
|
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||||
|
<html>
|
||||||
|
<head>
|
||||||
|
<title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
|
||||||
|
<meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
|
||||||
|
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||||
|
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-no-referrer-when-downgrade">
|
||||||
|
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||||
|
document served over http requires an http
|
||||||
|
sub-resource via img-tag using the attr-referrer
|
||||||
|
delivery method with swap-origin-redirect and when
|
||||||
|
the target request is same-origin.">
|
||||||
|
<script src="/resources/testharness.js"></script>
|
||||||
|
<script src="/resources/testharnessreport.js"></script>
|
||||||
|
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||||
|
<script src="/referrer-policy/generic/common.js"></script>
|
||||||
|
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||||
|
</head>
|
||||||
|
<body>
|
||||||
|
<script>
|
||||||
|
ReferrerPolicyTestCase(
|
||||||
|
{
|
||||||
|
"referrer_policy": "no-referrer-when-downgrade",
|
||||||
|
"delivery_method": "attr-referrer",
|
||||||
|
"redirection": "swap-origin-redirect",
|
||||||
|
"origin": "same-origin",
|
||||||
|
"source_protocol": "http",
|
||||||
|
"target_protocol": "http",
|
||||||
|
"subresource": "img-tag",
|
||||||
|
"subresource_path": "/referrer-policy/generic/subresource/image.py",
|
||||||
|
"referrer_url": "stripped-referrer"
|
||||||
|
},
|
||||||
|
document.querySelector("meta[name=assert]").content,
|
||||||
|
new SanityChecker()
|
||||||
|
).start();
|
||||||
|
</script>
|
||||||
|
<div id="log"></div>
|
||||||
|
</body>
|
||||||
|
</html>
|
|
@ -0,0 +1,40 @@
|
||||||
|
<!DOCTYPE html>
|
||||||
|
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||||
|
<html>
|
||||||
|
<head>
|
||||||
|
<title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
|
||||||
|
<meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
|
||||||
|
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||||
|
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-no-referrer-when-downgrade">
|
||||||
|
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||||
|
document served over http requires an https
|
||||||
|
sub-resource via iframe-tag using the attr-referrer
|
||||||
|
delivery method with keep-origin-redirect and when
|
||||||
|
the target request is same-origin.">
|
||||||
|
<script src="/resources/testharness.js"></script>
|
||||||
|
<script src="/resources/testharnessreport.js"></script>
|
||||||
|
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||||
|
<script src="/referrer-policy/generic/common.js"></script>
|
||||||
|
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||||
|
</head>
|
||||||
|
<body>
|
||||||
|
<script>
|
||||||
|
ReferrerPolicyTestCase(
|
||||||
|
{
|
||||||
|
"referrer_policy": "no-referrer-when-downgrade",
|
||||||
|
"delivery_method": "attr-referrer",
|
||||||
|
"redirection": "keep-origin-redirect",
|
||||||
|
"origin": "same-origin",
|
||||||
|
"source_protocol": "http",
|
||||||
|
"target_protocol": "https",
|
||||||
|
"subresource": "iframe-tag",
|
||||||
|
"subresource_path": "/referrer-policy/generic/subresource/document.py",
|
||||||
|
"referrer_url": "stripped-referrer"
|
||||||
|
},
|
||||||
|
document.querySelector("meta[name=assert]").content,
|
||||||
|
new SanityChecker()
|
||||||
|
).start();
|
||||||
|
</script>
|
||||||
|
<div id="log"></div>
|
||||||
|
</body>
|
||||||
|
</html>
|
|
@ -0,0 +1,40 @@
|
||||||
|
<!DOCTYPE html>
|
||||||
|
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||||
|
<html>
|
||||||
|
<head>
|
||||||
|
<title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
|
||||||
|
<meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
|
||||||
|
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||||
|
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-no-referrer-when-downgrade">
|
||||||
|
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||||
|
document served over http requires an https
|
||||||
|
sub-resource via iframe-tag using the attr-referrer
|
||||||
|
delivery method with no-redirect and when
|
||||||
|
the target request is same-origin.">
|
||||||
|
<script src="/resources/testharness.js"></script>
|
||||||
|
<script src="/resources/testharnessreport.js"></script>
|
||||||
|
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||||
|
<script src="/referrer-policy/generic/common.js"></script>
|
||||||
|
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||||
|
</head>
|
||||||
|
<body>
|
||||||
|
<script>
|
||||||
|
ReferrerPolicyTestCase(
|
||||||
|
{
|
||||||
|
"referrer_policy": "no-referrer-when-downgrade",
|
||||||
|
"delivery_method": "attr-referrer",
|
||||||
|
"redirection": "no-redirect",
|
||||||
|
"origin": "same-origin",
|
||||||
|
"source_protocol": "http",
|
||||||
|
"target_protocol": "https",
|
||||||
|
"subresource": "iframe-tag",
|
||||||
|
"subresource_path": "/referrer-policy/generic/subresource/document.py",
|
||||||
|
"referrer_url": "stripped-referrer"
|
||||||
|
},
|
||||||
|
document.querySelector("meta[name=assert]").content,
|
||||||
|
new SanityChecker()
|
||||||
|
).start();
|
||||||
|
</script>
|
||||||
|
<div id="log"></div>
|
||||||
|
</body>
|
||||||
|
</html>
|
|
@ -0,0 +1,40 @@
|
||||||
|
<!DOCTYPE html>
|
||||||
|
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||||
|
<html>
|
||||||
|
<head>
|
||||||
|
<title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
|
||||||
|
<meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
|
||||||
|
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||||
|
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-no-referrer-when-downgrade">
|
||||||
|
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||||
|
document served over http requires an https
|
||||||
|
sub-resource via iframe-tag using the attr-referrer
|
||||||
|
delivery method with swap-origin-redirect and when
|
||||||
|
the target request is same-origin.">
|
||||||
|
<script src="/resources/testharness.js"></script>
|
||||||
|
<script src="/resources/testharnessreport.js"></script>
|
||||||
|
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||||
|
<script src="/referrer-policy/generic/common.js"></script>
|
||||||
|
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||||
|
</head>
|
||||||
|
<body>
|
||||||
|
<script>
|
||||||
|
ReferrerPolicyTestCase(
|
||||||
|
{
|
||||||
|
"referrer_policy": "no-referrer-when-downgrade",
|
||||||
|
"delivery_method": "attr-referrer",
|
||||||
|
"redirection": "swap-origin-redirect",
|
||||||
|
"origin": "same-origin",
|
||||||
|
"source_protocol": "http",
|
||||||
|
"target_protocol": "https",
|
||||||
|
"subresource": "iframe-tag",
|
||||||
|
"subresource_path": "/referrer-policy/generic/subresource/document.py",
|
||||||
|
"referrer_url": "stripped-referrer"
|
||||||
|
},
|
||||||
|
document.querySelector("meta[name=assert]").content,
|
||||||
|
new SanityChecker()
|
||||||
|
).start();
|
||||||
|
</script>
|
||||||
|
<div id="log"></div>
|
||||||
|
</body>
|
||||||
|
</html>
|
|
@ -0,0 +1,40 @@
|
||||||
|
<!DOCTYPE html>
|
||||||
|
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||||
|
<html>
|
||||||
|
<head>
|
||||||
|
<title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
|
||||||
|
<meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
|
||||||
|
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||||
|
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-no-referrer-when-downgrade">
|
||||||
|
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||||
|
document served over http requires an https
|
||||||
|
sub-resource via img-tag using the attr-referrer
|
||||||
|
delivery method with keep-origin-redirect and when
|
||||||
|
the target request is same-origin.">
|
||||||
|
<script src="/resources/testharness.js"></script>
|
||||||
|
<script src="/resources/testharnessreport.js"></script>
|
||||||
|
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||||
|
<script src="/referrer-policy/generic/common.js"></script>
|
||||||
|
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||||
|
</head>
|
||||||
|
<body>
|
||||||
|
<script>
|
||||||
|
ReferrerPolicyTestCase(
|
||||||
|
{
|
||||||
|
"referrer_policy": "no-referrer-when-downgrade",
|
||||||
|
"delivery_method": "attr-referrer",
|
||||||
|
"redirection": "keep-origin-redirect",
|
||||||
|
"origin": "same-origin",
|
||||||
|
"source_protocol": "http",
|
||||||
|
"target_protocol": "https",
|
||||||
|
"subresource": "img-tag",
|
||||||
|
"subresource_path": "/referrer-policy/generic/subresource/image.py",
|
||||||
|
"referrer_url": "stripped-referrer"
|
||||||
|
},
|
||||||
|
document.querySelector("meta[name=assert]").content,
|
||||||
|
new SanityChecker()
|
||||||
|
).start();
|
||||||
|
</script>
|
||||||
|
<div id="log"></div>
|
||||||
|
</body>
|
||||||
|
</html>
|
|
@ -0,0 +1,40 @@
|
||||||
|
<!DOCTYPE html>
|
||||||
|
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||||
|
<html>
|
||||||
|
<head>
|
||||||
|
<title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
|
||||||
|
<meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
|
||||||
|
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||||
|
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-no-referrer-when-downgrade">
|
||||||
|
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||||
|
document served over http requires an https
|
||||||
|
sub-resource via img-tag using the attr-referrer
|
||||||
|
delivery method with no-redirect and when
|
||||||
|
the target request is same-origin.">
|
||||||
|
<script src="/resources/testharness.js"></script>
|
||||||
|
<script src="/resources/testharnessreport.js"></script>
|
||||||
|
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||||
|
<script src="/referrer-policy/generic/common.js"></script>
|
||||||
|
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||||
|
</head>
|
||||||
|
<body>
|
||||||
|
<script>
|
||||||
|
ReferrerPolicyTestCase(
|
||||||
|
{
|
||||||
|
"referrer_policy": "no-referrer-when-downgrade",
|
||||||
|
"delivery_method": "attr-referrer",
|
||||||
|
"redirection": "no-redirect",
|
||||||
|
"origin": "same-origin",
|
||||||
|
"source_protocol": "http",
|
||||||
|
"target_protocol": "https",
|
||||||
|
"subresource": "img-tag",
|
||||||
|
"subresource_path": "/referrer-policy/generic/subresource/image.py",
|
||||||
|
"referrer_url": "stripped-referrer"
|
||||||
|
},
|
||||||
|
document.querySelector("meta[name=assert]").content,
|
||||||
|
new SanityChecker()
|
||||||
|
).start();
|
||||||
|
</script>
|
||||||
|
<div id="log"></div>
|
||||||
|
</body>
|
||||||
|
</html>
|
|
@ -0,0 +1,40 @@
|
||||||
|
<!DOCTYPE html>
|
||||||
|
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||||
|
<html>
|
||||||
|
<head>
|
||||||
|
<title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
|
||||||
|
<meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
|
||||||
|
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||||
|
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-no-referrer-when-downgrade">
|
||||||
|
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||||
|
document served over http requires an https
|
||||||
|
sub-resource via img-tag using the attr-referrer
|
||||||
|
delivery method with swap-origin-redirect and when
|
||||||
|
the target request is same-origin.">
|
||||||
|
<script src="/resources/testharness.js"></script>
|
||||||
|
<script src="/resources/testharnessreport.js"></script>
|
||||||
|
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||||
|
<script src="/referrer-policy/generic/common.js"></script>
|
||||||
|
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||||
|
</head>
|
||||||
|
<body>
|
||||||
|
<script>
|
||||||
|
ReferrerPolicyTestCase(
|
||||||
|
{
|
||||||
|
"referrer_policy": "no-referrer-when-downgrade",
|
||||||
|
"delivery_method": "attr-referrer",
|
||||||
|
"redirection": "swap-origin-redirect",
|
||||||
|
"origin": "same-origin",
|
||||||
|
"source_protocol": "http",
|
||||||
|
"target_protocol": "https",
|
||||||
|
"subresource": "img-tag",
|
||||||
|
"subresource_path": "/referrer-policy/generic/subresource/image.py",
|
||||||
|
"referrer_url": "stripped-referrer"
|
||||||
|
},
|
||||||
|
document.querySelector("meta[name=assert]").content,
|
||||||
|
new SanityChecker()
|
||||||
|
).start();
|
||||||
|
</script>
|
||||||
|
<div id="log"></div>
|
||||||
|
</body>
|
||||||
|
</html>
|
|
@ -0,0 +1,40 @@
|
||||||
|
<!DOCTYPE html>
|
||||||
|
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||||
|
<html>
|
||||||
|
<head>
|
||||||
|
<title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
|
||||||
|
<meta name="description" content="Check that sub-resource never gets the referrer URL.">
|
||||||
|
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||||
|
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-no-referrer">
|
||||||
|
<meta name="assert" content="The referrer URL is omitted when a
|
||||||
|
document served over http requires an http
|
||||||
|
sub-resource via iframe-tag using the attr-referrer
|
||||||
|
delivery method with keep-origin-redirect and when
|
||||||
|
the target request is cross-origin.">
|
||||||
|
<script src="/resources/testharness.js"></script>
|
||||||
|
<script src="/resources/testharnessreport.js"></script>
|
||||||
|
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||||
|
<script src="/referrer-policy/generic/common.js"></script>
|
||||||
|
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||||
|
</head>
|
||||||
|
<body>
|
||||||
|
<script>
|
||||||
|
ReferrerPolicyTestCase(
|
||||||
|
{
|
||||||
|
"referrer_policy": "no-referrer",
|
||||||
|
"delivery_method": "attr-referrer",
|
||||||
|
"redirection": "keep-origin-redirect",
|
||||||
|
"origin": "cross-origin",
|
||||||
|
"source_protocol": "http",
|
||||||
|
"target_protocol": "http",
|
||||||
|
"subresource": "iframe-tag",
|
||||||
|
"subresource_path": "/referrer-policy/generic/subresource/document.py",
|
||||||
|
"referrer_url": "omitted"
|
||||||
|
},
|
||||||
|
document.querySelector("meta[name=assert]").content,
|
||||||
|
new SanityChecker()
|
||||||
|
).start();
|
||||||
|
</script>
|
||||||
|
<div id="log"></div>
|
||||||
|
</body>
|
||||||
|
</html>
|
|
@ -0,0 +1,40 @@
|
||||||
|
<!DOCTYPE html>
|
||||||
|
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||||
|
<html>
|
||||||
|
<head>
|
||||||
|
<title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
|
||||||
|
<meta name="description" content="Check that sub-resource never gets the referrer URL.">
|
||||||
|
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||||
|
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-no-referrer">
|
||||||
|
<meta name="assert" content="The referrer URL is omitted when a
|
||||||
|
document served over http requires an http
|
||||||
|
sub-resource via iframe-tag using the attr-referrer
|
||||||
|
delivery method with no-redirect and when
|
||||||
|
the target request is cross-origin.">
|
||||||
|
<script src="/resources/testharness.js"></script>
|
||||||
|
<script src="/resources/testharnessreport.js"></script>
|
||||||
|
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||||
|
<script src="/referrer-policy/generic/common.js"></script>
|
||||||
|
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||||
|
</head>
|
||||||
|
<body>
|
||||||
|
<script>
|
||||||
|
ReferrerPolicyTestCase(
|
||||||
|
{
|
||||||
|
"referrer_policy": "no-referrer",
|
||||||
|
"delivery_method": "attr-referrer",
|
||||||
|
"redirection": "no-redirect",
|
||||||
|
"origin": "cross-origin",
|
||||||
|
"source_protocol": "http",
|
||||||
|
"target_protocol": "http",
|
||||||
|
"subresource": "iframe-tag",
|
||||||
|
"subresource_path": "/referrer-policy/generic/subresource/document.py",
|
||||||
|
"referrer_url": "omitted"
|
||||||
|
},
|
||||||
|
document.querySelector("meta[name=assert]").content,
|
||||||
|
new SanityChecker()
|
||||||
|
).start();
|
||||||
|
</script>
|
||||||
|
<div id="log"></div>
|
||||||
|
</body>
|
||||||
|
</html>
|
|
@ -0,0 +1,40 @@
|
||||||
|
<!DOCTYPE html>
|
||||||
|
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||||
|
<html>
|
||||||
|
<head>
|
||||||
|
<title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
|
||||||
|
<meta name="description" content="Check that sub-resource never gets the referrer URL.">
|
||||||
|
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||||
|
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-no-referrer">
|
||||||
|
<meta name="assert" content="The referrer URL is omitted when a
|
||||||
|
document served over http requires an http
|
||||||
|
sub-resource via iframe-tag using the attr-referrer
|
||||||
|
delivery method with swap-origin-redirect and when
|
||||||
|
the target request is cross-origin.">
|
||||||
|
<script src="/resources/testharness.js"></script>
|
||||||
|
<script src="/resources/testharnessreport.js"></script>
|
||||||
|
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||||
|
<script src="/referrer-policy/generic/common.js"></script>
|
||||||
|
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||||
|
</head>
|
||||||
|
<body>
|
||||||
|
<script>
|
||||||
|
ReferrerPolicyTestCase(
|
||||||
|
{
|
||||||
|
"referrer_policy": "no-referrer",
|
||||||
|
"delivery_method": "attr-referrer",
|
||||||
|
"redirection": "swap-origin-redirect",
|
||||||
|
"origin": "cross-origin",
|
||||||
|
"source_protocol": "http",
|
||||||
|
"target_protocol": "http",
|
||||||
|
"subresource": "iframe-tag",
|
||||||
|
"subresource_path": "/referrer-policy/generic/subresource/document.py",
|
||||||
|
"referrer_url": "omitted"
|
||||||
|
},
|
||||||
|
document.querySelector("meta[name=assert]").content,
|
||||||
|
new SanityChecker()
|
||||||
|
).start();
|
||||||
|
</script>
|
||||||
|
<div id="log"></div>
|
||||||
|
</body>
|
||||||
|
</html>
|
|
@ -0,0 +1,40 @@
|
||||||
|
<!DOCTYPE html>
|
||||||
|
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||||
|
<html>
|
||||||
|
<head>
|
||||||
|
<title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
|
||||||
|
<meta name="description" content="Check that sub-resource never gets the referrer URL.">
|
||||||
|
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||||
|
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-no-referrer">
|
||||||
|
<meta name="assert" content="The referrer URL is omitted when a
|
||||||
|
document served over http requires an http
|
||||||
|
sub-resource via img-tag using the attr-referrer
|
||||||
|
delivery method with keep-origin-redirect and when
|
||||||
|
the target request is cross-origin.">
|
||||||
|
<script src="/resources/testharness.js"></script>
|
||||||
|
<script src="/resources/testharnessreport.js"></script>
|
||||||
|
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||||
|
<script src="/referrer-policy/generic/common.js"></script>
|
||||||
|
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||||
|
</head>
|
||||||
|
<body>
|
||||||
|
<script>
|
||||||
|
ReferrerPolicyTestCase(
|
||||||
|
{
|
||||||
|
"referrer_policy": "no-referrer",
|
||||||
|
"delivery_method": "attr-referrer",
|
||||||
|
"redirection": "keep-origin-redirect",
|
||||||
|
"origin": "cross-origin",
|
||||||
|
"source_protocol": "http",
|
||||||
|
"target_protocol": "http",
|
||||||
|
"subresource": "img-tag",
|
||||||
|
"subresource_path": "/referrer-policy/generic/subresource/image.py",
|
||||||
|
"referrer_url": "omitted"
|
||||||
|
},
|
||||||
|
document.querySelector("meta[name=assert]").content,
|
||||||
|
new SanityChecker()
|
||||||
|
).start();
|
||||||
|
</script>
|
||||||
|
<div id="log"></div>
|
||||||
|
</body>
|
||||||
|
</html>
|
|
@ -0,0 +1,40 @@
|
||||||
|
<!DOCTYPE html>
|
||||||
|
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||||
|
<html>
|
||||||
|
<head>
|
||||||
|
<title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
|
||||||
|
<meta name="description" content="Check that sub-resource never gets the referrer URL.">
|
||||||
|
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||||
|
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-no-referrer">
|
||||||
|
<meta name="assert" content="The referrer URL is omitted when a
|
||||||
|
document served over http requires an http
|
||||||
|
sub-resource via img-tag using the attr-referrer
|
||||||
|
delivery method with no-redirect and when
|
||||||
|
the target request is cross-origin.">
|
||||||
|
<script src="/resources/testharness.js"></script>
|
||||||
|
<script src="/resources/testharnessreport.js"></script>
|
||||||
|
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||||
|
<script src="/referrer-policy/generic/common.js"></script>
|
||||||
|
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||||
|
</head>
|
||||||
|
<body>
|
||||||
|
<script>
|
||||||
|
ReferrerPolicyTestCase(
|
||||||
|
{
|
||||||
|
"referrer_policy": "no-referrer",
|
||||||
|
"delivery_method": "attr-referrer",
|
||||||
|
"redirection": "no-redirect",
|
||||||
|
"origin": "cross-origin",
|
||||||
|
"source_protocol": "http",
|
||||||
|
"target_protocol": "http",
|
||||||
|
"subresource": "img-tag",
|
||||||
|
"subresource_path": "/referrer-policy/generic/subresource/image.py",
|
||||||
|
"referrer_url": "omitted"
|
||||||
|
},
|
||||||
|
document.querySelector("meta[name=assert]").content,
|
||||||
|
new SanityChecker()
|
||||||
|
).start();
|
||||||
|
</script>
|
||||||
|
<div id="log"></div>
|
||||||
|
</body>
|
||||||
|
</html>
|
|
@ -0,0 +1,40 @@
|
||||||
|
<!DOCTYPE html>
|
||||||
|
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||||
|
<html>
|
||||||
|
<head>
|
||||||
|
<title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
|
||||||
|
<meta name="description" content="Check that sub-resource never gets the referrer URL.">
|
||||||
|
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||||
|
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-no-referrer">
|
||||||
|
<meta name="assert" content="The referrer URL is omitted when a
|
||||||
|
document served over http requires an http
|
||||||
|
sub-resource via img-tag using the attr-referrer
|
||||||
|
delivery method with swap-origin-redirect and when
|
||||||
|
the target request is cross-origin.">
|
||||||
|
<script src="/resources/testharness.js"></script>
|
||||||
|
<script src="/resources/testharnessreport.js"></script>
|
||||||
|
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||||
|
<script src="/referrer-policy/generic/common.js"></script>
|
||||||
|
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||||
|
</head>
|
||||||
|
<body>
|
||||||
|
<script>
|
||||||
|
ReferrerPolicyTestCase(
|
||||||
|
{
|
||||||
|
"referrer_policy": "no-referrer",
|
||||||
|
"delivery_method": "attr-referrer",
|
||||||
|
"redirection": "swap-origin-redirect",
|
||||||
|
"origin": "cross-origin",
|
||||||
|
"source_protocol": "http",
|
||||||
|
"target_protocol": "http",
|
||||||
|
"subresource": "img-tag",
|
||||||
|
"subresource_path": "/referrer-policy/generic/subresource/image.py",
|
||||||
|
"referrer_url": "omitted"
|
||||||
|
},
|
||||||
|
document.querySelector("meta[name=assert]").content,
|
||||||
|
new SanityChecker()
|
||||||
|
).start();
|
||||||
|
</script>
|
||||||
|
<div id="log"></div>
|
||||||
|
</body>
|
||||||
|
</html>
|
|
@ -0,0 +1,40 @@
|
||||||
|
<!DOCTYPE html>
|
||||||
|
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||||
|
<html>
|
||||||
|
<head>
|
||||||
|
<title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
|
||||||
|
<meta name="description" content="Check that sub-resource never gets the referrer URL.">
|
||||||
|
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||||
|
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-no-referrer">
|
||||||
|
<meta name="assert" content="The referrer URL is omitted when a
|
||||||
|
document served over http requires an https
|
||||||
|
sub-resource via iframe-tag using the attr-referrer
|
||||||
|
delivery method with keep-origin-redirect and when
|
||||||
|
the target request is cross-origin.">
|
||||||
|
<script src="/resources/testharness.js"></script>
|
||||||
|
<script src="/resources/testharnessreport.js"></script>
|
||||||
|
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||||
|
<script src="/referrer-policy/generic/common.js"></script>
|
||||||
|
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||||
|
</head>
|
||||||
|
<body>
|
||||||
|
<script>
|
||||||
|
ReferrerPolicyTestCase(
|
||||||
|
{
|
||||||
|
"referrer_policy": "no-referrer",
|
||||||
|
"delivery_method": "attr-referrer",
|
||||||
|
"redirection": "keep-origin-redirect",
|
||||||
|
"origin": "cross-origin",
|
||||||
|
"source_protocol": "http",
|
||||||
|
"target_protocol": "https",
|
||||||
|
"subresource": "iframe-tag",
|
||||||
|
"subresource_path": "/referrer-policy/generic/subresource/document.py",
|
||||||
|
"referrer_url": "omitted"
|
||||||
|
},
|
||||||
|
document.querySelector("meta[name=assert]").content,
|
||||||
|
new SanityChecker()
|
||||||
|
).start();
|
||||||
|
</script>
|
||||||
|
<div id="log"></div>
|
||||||
|
</body>
|
||||||
|
</html>
|
|
@ -0,0 +1,40 @@
|
||||||
|
<!DOCTYPE html>
|
||||||
|
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||||
|
<html>
|
||||||
|
<head>
|
||||||
|
<title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
|
||||||
|
<meta name="description" content="Check that sub-resource never gets the referrer URL.">
|
||||||
|
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||||
|
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-no-referrer">
|
||||||
|
<meta name="assert" content="The referrer URL is omitted when a
|
||||||
|
document served over http requires an https
|
||||||
|
sub-resource via iframe-tag using the attr-referrer
|
||||||
|
delivery method with no-redirect and when
|
||||||
|
the target request is cross-origin.">
|
||||||
|
<script src="/resources/testharness.js"></script>
|
||||||
|
<script src="/resources/testharnessreport.js"></script>
|
||||||
|
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||||
|
<script src="/referrer-policy/generic/common.js"></script>
|
||||||
|
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||||
|
</head>
|
||||||
|
<body>
|
||||||
|
<script>
|
||||||
|
ReferrerPolicyTestCase(
|
||||||
|
{
|
||||||
|
"referrer_policy": "no-referrer",
|
||||||
|
"delivery_method": "attr-referrer",
|
||||||
|
"redirection": "no-redirect",
|
||||||
|
"origin": "cross-origin",
|
||||||
|
"source_protocol": "http",
|
||||||
|
"target_protocol": "https",
|
||||||
|
"subresource": "iframe-tag",
|
||||||
|
"subresource_path": "/referrer-policy/generic/subresource/document.py",
|
||||||
|
"referrer_url": "omitted"
|
||||||
|
},
|
||||||
|
document.querySelector("meta[name=assert]").content,
|
||||||
|
new SanityChecker()
|
||||||
|
).start();
|
||||||
|
</script>
|
||||||
|
<div id="log"></div>
|
||||||
|
</body>
|
||||||
|
</html>
|
|
@ -0,0 +1,40 @@
|
||||||
|
<!DOCTYPE html>
|
||||||
|
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||||
|
<html>
|
||||||
|
<head>
|
||||||
|
<title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
|
||||||
|
<meta name="description" content="Check that sub-resource never gets the referrer URL.">
|
||||||
|
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||||
|
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-no-referrer">
|
||||||
|
<meta name="assert" content="The referrer URL is omitted when a
|
||||||
|
document served over http requires an https
|
||||||
|
sub-resource via iframe-tag using the attr-referrer
|
||||||
|
delivery method with swap-origin-redirect and when
|
||||||
|
the target request is cross-origin.">
|
||||||
|
<script src="/resources/testharness.js"></script>
|
||||||
|
<script src="/resources/testharnessreport.js"></script>
|
||||||
|
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||||
|
<script src="/referrer-policy/generic/common.js"></script>
|
||||||
|
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||||
|
</head>
|
||||||
|
<body>
|
||||||
|
<script>
|
||||||
|
ReferrerPolicyTestCase(
|
||||||
|
{
|
||||||
|
"referrer_policy": "no-referrer",
|
||||||
|
"delivery_method": "attr-referrer",
|
||||||
|
"redirection": "swap-origin-redirect",
|
||||||
|
"origin": "cross-origin",
|
||||||
|
"source_protocol": "http",
|
||||||
|
"target_protocol": "https",
|
||||||
|
"subresource": "iframe-tag",
|
||||||
|
"subresource_path": "/referrer-policy/generic/subresource/document.py",
|
||||||
|
"referrer_url": "omitted"
|
||||||
|
},
|
||||||
|
document.querySelector("meta[name=assert]").content,
|
||||||
|
new SanityChecker()
|
||||||
|
).start();
|
||||||
|
</script>
|
||||||
|
<div id="log"></div>
|
||||||
|
</body>
|
||||||
|
</html>
|
|
@ -0,0 +1,40 @@
|
||||||
|
<!DOCTYPE html>
|
||||||
|
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||||
|
<html>
|
||||||
|
<head>
|
||||||
|
<title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
|
||||||
|
<meta name="description" content="Check that sub-resource never gets the referrer URL.">
|
||||||
|
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||||
|
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-no-referrer">
|
||||||
|
<meta name="assert" content="The referrer URL is omitted when a
|
||||||
|
document served over http requires an https
|
||||||
|
sub-resource via img-tag using the attr-referrer
|
||||||
|
delivery method with keep-origin-redirect and when
|
||||||
|
the target request is cross-origin.">
|
||||||
|
<script src="/resources/testharness.js"></script>
|
||||||
|
<script src="/resources/testharnessreport.js"></script>
|
||||||
|
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||||
|
<script src="/referrer-policy/generic/common.js"></script>
|
||||||
|
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||||
|
</head>
|
||||||
|
<body>
|
||||||
|
<script>
|
||||||
|
ReferrerPolicyTestCase(
|
||||||
|
{
|
||||||
|
"referrer_policy": "no-referrer",
|
||||||
|
"delivery_method": "attr-referrer",
|
||||||
|
"redirection": "keep-origin-redirect",
|
||||||
|
"origin": "cross-origin",
|
||||||
|
"source_protocol": "http",
|
||||||
|
"target_protocol": "https",
|
||||||
|
"subresource": "img-tag",
|
||||||
|
"subresource_path": "/referrer-policy/generic/subresource/image.py",
|
||||||
|
"referrer_url": "omitted"
|
||||||
|
},
|
||||||
|
document.querySelector("meta[name=assert]").content,
|
||||||
|
new SanityChecker()
|
||||||
|
).start();
|
||||||
|
</script>
|
||||||
|
<div id="log"></div>
|
||||||
|
</body>
|
||||||
|
</html>
|
|
@ -0,0 +1,40 @@
|
||||||
|
<!DOCTYPE html>
|
||||||
|
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||||
|
<html>
|
||||||
|
<head>
|
||||||
|
<title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
|
||||||
|
<meta name="description" content="Check that sub-resource never gets the referrer URL.">
|
||||||
|
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||||
|
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-no-referrer">
|
||||||
|
<meta name="assert" content="The referrer URL is omitted when a
|
||||||
|
document served over http requires an https
|
||||||
|
sub-resource via img-tag using the attr-referrer
|
||||||
|
delivery method with no-redirect and when
|
||||||
|
the target request is cross-origin.">
|
||||||
|
<script src="/resources/testharness.js"></script>
|
||||||
|
<script src="/resources/testharnessreport.js"></script>
|
||||||
|
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||||
|
<script src="/referrer-policy/generic/common.js"></script>
|
||||||
|
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||||
|
</head>
|
||||||
|
<body>
|
||||||
|
<script>
|
||||||
|
ReferrerPolicyTestCase(
|
||||||
|
{
|
||||||
|
"referrer_policy": "no-referrer",
|
||||||
|
"delivery_method": "attr-referrer",
|
||||||
|
"redirection": "no-redirect",
|
||||||
|
"origin": "cross-origin",
|
||||||
|
"source_protocol": "http",
|
||||||
|
"target_protocol": "https",
|
||||||
|
"subresource": "img-tag",
|
||||||
|
"subresource_path": "/referrer-policy/generic/subresource/image.py",
|
||||||
|
"referrer_url": "omitted"
|
||||||
|
},
|
||||||
|
document.querySelector("meta[name=assert]").content,
|
||||||
|
new SanityChecker()
|
||||||
|
).start();
|
||||||
|
</script>
|
||||||
|
<div id="log"></div>
|
||||||
|
</body>
|
||||||
|
</html>
|
|
@ -0,0 +1,40 @@
|
||||||
|
<!DOCTYPE html>
|
||||||
|
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||||
|
<html>
|
||||||
|
<head>
|
||||||
|
<title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
|
||||||
|
<meta name="description" content="Check that sub-resource never gets the referrer URL.">
|
||||||
|
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||||
|
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-no-referrer">
|
||||||
|
<meta name="assert" content="The referrer URL is omitted when a
|
||||||
|
document served over http requires an https
|
||||||
|
sub-resource via img-tag using the attr-referrer
|
||||||
|
delivery method with swap-origin-redirect and when
|
||||||
|
the target request is cross-origin.">
|
||||||
|
<script src="/resources/testharness.js"></script>
|
||||||
|
<script src="/resources/testharnessreport.js"></script>
|
||||||
|
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||||
|
<script src="/referrer-policy/generic/common.js"></script>
|
||||||
|
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||||
|
</head>
|
||||||
|
<body>
|
||||||
|
<script>
|
||||||
|
ReferrerPolicyTestCase(
|
||||||
|
{
|
||||||
|
"referrer_policy": "no-referrer",
|
||||||
|
"delivery_method": "attr-referrer",
|
||||||
|
"redirection": "swap-origin-redirect",
|
||||||
|
"origin": "cross-origin",
|
||||||
|
"source_protocol": "http",
|
||||||
|
"target_protocol": "https",
|
||||||
|
"subresource": "img-tag",
|
||||||
|
"subresource_path": "/referrer-policy/generic/subresource/image.py",
|
||||||
|
"referrer_url": "omitted"
|
||||||
|
},
|
||||||
|
document.querySelector("meta[name=assert]").content,
|
||||||
|
new SanityChecker()
|
||||||
|
).start();
|
||||||
|
</script>
|
||||||
|
<div id="log"></div>
|
||||||
|
</body>
|
||||||
|
</html>
|
|
@ -0,0 +1,40 @@
|
||||||
|
<!DOCTYPE html>
|
||||||
|
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||||
|
<html>
|
||||||
|
<head>
|
||||||
|
<title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
|
||||||
|
<meta name="description" content="Check that sub-resource never gets the referrer URL.">
|
||||||
|
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||||
|
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-no-referrer">
|
||||||
|
<meta name="assert" content="The referrer URL is omitted when a
|
||||||
|
document served over http requires an http
|
||||||
|
sub-resource via iframe-tag using the attr-referrer
|
||||||
|
delivery method with keep-origin-redirect and when
|
||||||
|
the target request is same-origin.">
|
||||||
|
<script src="/resources/testharness.js"></script>
|
||||||
|
<script src="/resources/testharnessreport.js"></script>
|
||||||
|
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||||
|
<script src="/referrer-policy/generic/common.js"></script>
|
||||||
|
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||||
|
</head>
|
||||||
|
<body>
|
||||||
|
<script>
|
||||||
|
ReferrerPolicyTestCase(
|
||||||
|
{
|
||||||
|
"referrer_policy": "no-referrer",
|
||||||
|
"delivery_method": "attr-referrer",
|
||||||
|
"redirection": "keep-origin-redirect",
|
||||||
|
"origin": "same-origin",
|
||||||
|
"source_protocol": "http",
|
||||||
|
"target_protocol": "http",
|
||||||
|
"subresource": "iframe-tag",
|
||||||
|
"subresource_path": "/referrer-policy/generic/subresource/document.py",
|
||||||
|
"referrer_url": "omitted"
|
||||||
|
},
|
||||||
|
document.querySelector("meta[name=assert]").content,
|
||||||
|
new SanityChecker()
|
||||||
|
).start();
|
||||||
|
</script>
|
||||||
|
<div id="log"></div>
|
||||||
|
</body>
|
||||||
|
</html>
|
|
@ -0,0 +1,40 @@
|
||||||
|
<!DOCTYPE html>
|
||||||
|
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||||
|
<html>
|
||||||
|
<head>
|
||||||
|
<title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
|
||||||
|
<meta name="description" content="Check that sub-resource never gets the referrer URL.">
|
||||||
|
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||||
|
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-no-referrer">
|
||||||
|
<meta name="assert" content="The referrer URL is omitted when a
|
||||||
|
document served over http requires an http
|
||||||
|
sub-resource via iframe-tag using the attr-referrer
|
||||||
|
delivery method with no-redirect and when
|
||||||
|
the target request is same-origin.">
|
||||||
|
<script src="/resources/testharness.js"></script>
|
||||||
|
<script src="/resources/testharnessreport.js"></script>
|
||||||
|
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||||
|
<script src="/referrer-policy/generic/common.js"></script>
|
||||||
|
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||||
|
</head>
|
||||||
|
<body>
|
||||||
|
<script>
|
||||||
|
ReferrerPolicyTestCase(
|
||||||
|
{
|
||||||
|
"referrer_policy": "no-referrer",
|
||||||
|
"delivery_method": "attr-referrer",
|
||||||
|
"redirection": "no-redirect",
|
||||||
|
"origin": "same-origin",
|
||||||
|
"source_protocol": "http",
|
||||||
|
"target_protocol": "http",
|
||||||
|
"subresource": "iframe-tag",
|
||||||
|
"subresource_path": "/referrer-policy/generic/subresource/document.py",
|
||||||
|
"referrer_url": "omitted"
|
||||||
|
},
|
||||||
|
document.querySelector("meta[name=assert]").content,
|
||||||
|
new SanityChecker()
|
||||||
|
).start();
|
||||||
|
</script>
|
||||||
|
<div id="log"></div>
|
||||||
|
</body>
|
||||||
|
</html>
|
|
@ -0,0 +1,40 @@
|
||||||
|
<!DOCTYPE html>
|
||||||
|
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||||
|
<html>
|
||||||
|
<head>
|
||||||
|
<title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
|
||||||
|
<meta name="description" content="Check that sub-resource never gets the referrer URL.">
|
||||||
|
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||||
|
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-no-referrer">
|
||||||
|
<meta name="assert" content="The referrer URL is omitted when a
|
||||||
|
document served over http requires an http
|
||||||
|
sub-resource via iframe-tag using the attr-referrer
|
||||||
|
delivery method with swap-origin-redirect and when
|
||||||
|
the target request is same-origin.">
|
||||||
|
<script src="/resources/testharness.js"></script>
|
||||||
|
<script src="/resources/testharnessreport.js"></script>
|
||||||
|
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||||
|
<script src="/referrer-policy/generic/common.js"></script>
|
||||||
|
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||||
|
</head>
|
||||||
|
<body>
|
||||||
|
<script>
|
||||||
|
ReferrerPolicyTestCase(
|
||||||
|
{
|
||||||
|
"referrer_policy": "no-referrer",
|
||||||
|
"delivery_method": "attr-referrer",
|
||||||
|
"redirection": "swap-origin-redirect",
|
||||||
|
"origin": "same-origin",
|
||||||
|
"source_protocol": "http",
|
||||||
|
"target_protocol": "http",
|
||||||
|
"subresource": "iframe-tag",
|
||||||
|
"subresource_path": "/referrer-policy/generic/subresource/document.py",
|
||||||
|
"referrer_url": "omitted"
|
||||||
|
},
|
||||||
|
document.querySelector("meta[name=assert]").content,
|
||||||
|
new SanityChecker()
|
||||||
|
).start();
|
||||||
|
</script>
|
||||||
|
<div id="log"></div>
|
||||||
|
</body>
|
||||||
|
</html>
|
|
@ -0,0 +1,40 @@
|
||||||
|
<!DOCTYPE html>
|
||||||
|
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||||
|
<html>
|
||||||
|
<head>
|
||||||
|
<title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
|
||||||
|
<meta name="description" content="Check that sub-resource never gets the referrer URL.">
|
||||||
|
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||||
|
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-no-referrer">
|
||||||
|
<meta name="assert" content="The referrer URL is omitted when a
|
||||||
|
document served over http requires an http
|
||||||
|
sub-resource via img-tag using the attr-referrer
|
||||||
|
delivery method with keep-origin-redirect and when
|
||||||
|
the target request is same-origin.">
|
||||||
|
<script src="/resources/testharness.js"></script>
|
||||||
|
<script src="/resources/testharnessreport.js"></script>
|
||||||
|
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||||
|
<script src="/referrer-policy/generic/common.js"></script>
|
||||||
|
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||||
|
</head>
|
||||||
|
<body>
|
||||||
|
<script>
|
||||||
|
ReferrerPolicyTestCase(
|
||||||
|
{
|
||||||
|
"referrer_policy": "no-referrer",
|
||||||
|
"delivery_method": "attr-referrer",
|
||||||
|
"redirection": "keep-origin-redirect",
|
||||||
|
"origin": "same-origin",
|
||||||
|
"source_protocol": "http",
|
||||||
|
"target_protocol": "http",
|
||||||
|
"subresource": "img-tag",
|
||||||
|
"subresource_path": "/referrer-policy/generic/subresource/image.py",
|
||||||
|
"referrer_url": "omitted"
|
||||||
|
},
|
||||||
|
document.querySelector("meta[name=assert]").content,
|
||||||
|
new SanityChecker()
|
||||||
|
).start();
|
||||||
|
</script>
|
||||||
|
<div id="log"></div>
|
||||||
|
</body>
|
||||||
|
</html>
|
|
@ -0,0 +1,40 @@
|
||||||
|
<!DOCTYPE html>
|
||||||
|
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||||
|
<html>
|
||||||
|
<head>
|
||||||
|
<title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
|
||||||
|
<meta name="description" content="Check that sub-resource never gets the referrer URL.">
|
||||||
|
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||||
|
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-no-referrer">
|
||||||
|
<meta name="assert" content="The referrer URL is omitted when a
|
||||||
|
document served over http requires an http
|
||||||
|
sub-resource via img-tag using the attr-referrer
|
||||||
|
delivery method with no-redirect and when
|
||||||
|
the target request is same-origin.">
|
||||||
|
<script src="/resources/testharness.js"></script>
|
||||||
|
<script src="/resources/testharnessreport.js"></script>
|
||||||
|
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||||
|
<script src="/referrer-policy/generic/common.js"></script>
|
||||||
|
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||||
|
</head>
|
||||||
|
<body>
|
||||||
|
<script>
|
||||||
|
ReferrerPolicyTestCase(
|
||||||
|
{
|
||||||
|
"referrer_policy": "no-referrer",
|
||||||
|
"delivery_method": "attr-referrer",
|
||||||
|
"redirection": "no-redirect",
|
||||||
|
"origin": "same-origin",
|
||||||
|
"source_protocol": "http",
|
||||||
|
"target_protocol": "http",
|
||||||
|
"subresource": "img-tag",
|
||||||
|
"subresource_path": "/referrer-policy/generic/subresource/image.py",
|
||||||
|
"referrer_url": "omitted"
|
||||||
|
},
|
||||||
|
document.querySelector("meta[name=assert]").content,
|
||||||
|
new SanityChecker()
|
||||||
|
).start();
|
||||||
|
</script>
|
||||||
|
<div id="log"></div>
|
||||||
|
</body>
|
||||||
|
</html>
|
|
@ -0,0 +1,40 @@
|
||||||
|
<!DOCTYPE html>
|
||||||
|
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||||
|
<html>
|
||||||
|
<head>
|
||||||
|
<title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
|
||||||
|
<meta name="description" content="Check that sub-resource never gets the referrer URL.">
|
||||||
|
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||||
|
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-no-referrer">
|
||||||
|
<meta name="assert" content="The referrer URL is omitted when a
|
||||||
|
document served over http requires an http
|
||||||
|
sub-resource via img-tag using the attr-referrer
|
||||||
|
delivery method with swap-origin-redirect and when
|
||||||
|
the target request is same-origin.">
|
||||||
|
<script src="/resources/testharness.js"></script>
|
||||||
|
<script src="/resources/testharnessreport.js"></script>
|
||||||
|
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||||
|
<script src="/referrer-policy/generic/common.js"></script>
|
||||||
|
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||||
|
</head>
|
||||||
|
<body>
|
||||||
|
<script>
|
||||||
|
ReferrerPolicyTestCase(
|
||||||
|
{
|
||||||
|
"referrer_policy": "no-referrer",
|
||||||
|
"delivery_method": "attr-referrer",
|
||||||
|
"redirection": "swap-origin-redirect",
|
||||||
|
"origin": "same-origin",
|
||||||
|
"source_protocol": "http",
|
||||||
|
"target_protocol": "http",
|
||||||
|
"subresource": "img-tag",
|
||||||
|
"subresource_path": "/referrer-policy/generic/subresource/image.py",
|
||||||
|
"referrer_url": "omitted"
|
||||||
|
},
|
||||||
|
document.querySelector("meta[name=assert]").content,
|
||||||
|
new SanityChecker()
|
||||||
|
).start();
|
||||||
|
</script>
|
||||||
|
<div id="log"></div>
|
||||||
|
</body>
|
||||||
|
</html>
|
|
@ -0,0 +1,40 @@
|
||||||
|
<!DOCTYPE html>
|
||||||
|
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||||
|
<html>
|
||||||
|
<head>
|
||||||
|
<title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
|
||||||
|
<meta name="description" content="Check that sub-resource never gets the referrer URL.">
|
||||||
|
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||||
|
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-no-referrer">
|
||||||
|
<meta name="assert" content="The referrer URL is omitted when a
|
||||||
|
document served over http requires an https
|
||||||
|
sub-resource via iframe-tag using the attr-referrer
|
||||||
|
delivery method with keep-origin-redirect and when
|
||||||
|
the target request is same-origin.">
|
||||||
|
<script src="/resources/testharness.js"></script>
|
||||||
|
<script src="/resources/testharnessreport.js"></script>
|
||||||
|
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||||
|
<script src="/referrer-policy/generic/common.js"></script>
|
||||||
|
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||||
|
</head>
|
||||||
|
<body>
|
||||||
|
<script>
|
||||||
|
ReferrerPolicyTestCase(
|
||||||
|
{
|
||||||
|
"referrer_policy": "no-referrer",
|
||||||
|
"delivery_method": "attr-referrer",
|
||||||
|
"redirection": "keep-origin-redirect",
|
||||||
|
"origin": "same-origin",
|
||||||
|
"source_protocol": "http",
|
||||||
|
"target_protocol": "https",
|
||||||
|
"subresource": "iframe-tag",
|
||||||
|
"subresource_path": "/referrer-policy/generic/subresource/document.py",
|
||||||
|
"referrer_url": "omitted"
|
||||||
|
},
|
||||||
|
document.querySelector("meta[name=assert]").content,
|
||||||
|
new SanityChecker()
|
||||||
|
).start();
|
||||||
|
</script>
|
||||||
|
<div id="log"></div>
|
||||||
|
</body>
|
||||||
|
</html>
|
|
@ -0,0 +1,40 @@
|
||||||
|
<!DOCTYPE html>
|
||||||
|
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||||
|
<html>
|
||||||
|
<head>
|
||||||
|
<title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
|
||||||
|
<meta name="description" content="Check that sub-resource never gets the referrer URL.">
|
||||||
|
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||||
|
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-no-referrer">
|
||||||
|
<meta name="assert" content="The referrer URL is omitted when a
|
||||||
|
document served over http requires an https
|
||||||
|
sub-resource via iframe-tag using the attr-referrer
|
||||||
|
delivery method with no-redirect and when
|
||||||
|
the target request is same-origin.">
|
||||||
|
<script src="/resources/testharness.js"></script>
|
||||||
|
<script src="/resources/testharnessreport.js"></script>
|
||||||
|
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||||
|
<script src="/referrer-policy/generic/common.js"></script>
|
||||||
|
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||||
|
</head>
|
||||||
|
<body>
|
||||||
|
<script>
|
||||||
|
ReferrerPolicyTestCase(
|
||||||
|
{
|
||||||
|
"referrer_policy": "no-referrer",
|
||||||
|
"delivery_method": "attr-referrer",
|
||||||
|
"redirection": "no-redirect",
|
||||||
|
"origin": "same-origin",
|
||||||
|
"source_protocol": "http",
|
||||||
|
"target_protocol": "https",
|
||||||
|
"subresource": "iframe-tag",
|
||||||
|
"subresource_path": "/referrer-policy/generic/subresource/document.py",
|
||||||
|
"referrer_url": "omitted"
|
||||||
|
},
|
||||||
|
document.querySelector("meta[name=assert]").content,
|
||||||
|
new SanityChecker()
|
||||||
|
).start();
|
||||||
|
</script>
|
||||||
|
<div id="log"></div>
|
||||||
|
</body>
|
||||||
|
</html>
|
|
@ -0,0 +1,40 @@
|
||||||
|
<!DOCTYPE html>
|
||||||
|
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||||
|
<html>
|
||||||
|
<head>
|
||||||
|
<title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
|
||||||
|
<meta name="description" content="Check that sub-resource never gets the referrer URL.">
|
||||||
|
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||||
|
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-no-referrer">
|
||||||
|
<meta name="assert" content="The referrer URL is omitted when a
|
||||||
|
document served over http requires an https
|
||||||
|
sub-resource via iframe-tag using the attr-referrer
|
||||||
|
delivery method with swap-origin-redirect and when
|
||||||
|
the target request is same-origin.">
|
||||||
|
<script src="/resources/testharness.js"></script>
|
||||||
|
<script src="/resources/testharnessreport.js"></script>
|
||||||
|
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||||
|
<script src="/referrer-policy/generic/common.js"></script>
|
||||||
|
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||||
|
</head>
|
||||||
|
<body>
|
||||||
|
<script>
|
||||||
|
ReferrerPolicyTestCase(
|
||||||
|
{
|
||||||
|
"referrer_policy": "no-referrer",
|
||||||
|
"delivery_method": "attr-referrer",
|
||||||
|
"redirection": "swap-origin-redirect",
|
||||||
|
"origin": "same-origin",
|
||||||
|
"source_protocol": "http",
|
||||||
|
"target_protocol": "https",
|
||||||
|
"subresource": "iframe-tag",
|
||||||
|
"subresource_path": "/referrer-policy/generic/subresource/document.py",
|
||||||
|
"referrer_url": "omitted"
|
||||||
|
},
|
||||||
|
document.querySelector("meta[name=assert]").content,
|
||||||
|
new SanityChecker()
|
||||||
|
).start();
|
||||||
|
</script>
|
||||||
|
<div id="log"></div>
|
||||||
|
</body>
|
||||||
|
</html>
|
|
@ -0,0 +1,40 @@
|
||||||
|
<!DOCTYPE html>
|
||||||
|
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||||
|
<html>
|
||||||
|
<head>
|
||||||
|
<title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
|
||||||
|
<meta name="description" content="Check that sub-resource never gets the referrer URL.">
|
||||||
|
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||||
|
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-no-referrer">
|
||||||
|
<meta name="assert" content="The referrer URL is omitted when a
|
||||||
|
document served over http requires an https
|
||||||
|
sub-resource via img-tag using the attr-referrer
|
||||||
|
delivery method with keep-origin-redirect and when
|
||||||
|
the target request is same-origin.">
|
||||||
|
<script src="/resources/testharness.js"></script>
|
||||||
|
<script src="/resources/testharnessreport.js"></script>
|
||||||
|
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||||
|
<script src="/referrer-policy/generic/common.js"></script>
|
||||||
|
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||||
|
</head>
|
||||||
|
<body>
|
||||||
|
<script>
|
||||||
|
ReferrerPolicyTestCase(
|
||||||
|
{
|
||||||
|
"referrer_policy": "no-referrer",
|
||||||
|
"delivery_method": "attr-referrer",
|
||||||
|
"redirection": "keep-origin-redirect",
|
||||||
|
"origin": "same-origin",
|
||||||
|
"source_protocol": "http",
|
||||||
|
"target_protocol": "https",
|
||||||
|
"subresource": "img-tag",
|
||||||
|
"subresource_path": "/referrer-policy/generic/subresource/image.py",
|
||||||
|
"referrer_url": "omitted"
|
||||||
|
},
|
||||||
|
document.querySelector("meta[name=assert]").content,
|
||||||
|
new SanityChecker()
|
||||||
|
).start();
|
||||||
|
</script>
|
||||||
|
<div id="log"></div>
|
||||||
|
</body>
|
||||||
|
</html>
|
|
@ -0,0 +1,40 @@
|
||||||
|
<!DOCTYPE html>
|
||||||
|
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||||
|
<html>
|
||||||
|
<head>
|
||||||
|
<title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
|
||||||
|
<meta name="description" content="Check that sub-resource never gets the referrer URL.">
|
||||||
|
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||||
|
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-no-referrer">
|
||||||
|
<meta name="assert" content="The referrer URL is omitted when a
|
||||||
|
document served over http requires an https
|
||||||
|
sub-resource via img-tag using the attr-referrer
|
||||||
|
delivery method with no-redirect and when
|
||||||
|
the target request is same-origin.">
|
||||||
|
<script src="/resources/testharness.js"></script>
|
||||||
|
<script src="/resources/testharnessreport.js"></script>
|
||||||
|
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||||
|
<script src="/referrer-policy/generic/common.js"></script>
|
||||||
|
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||||
|
</head>
|
||||||
|
<body>
|
||||||
|
<script>
|
||||||
|
ReferrerPolicyTestCase(
|
||||||
|
{
|
||||||
|
"referrer_policy": "no-referrer",
|
||||||
|
"delivery_method": "attr-referrer",
|
||||||
|
"redirection": "no-redirect",
|
||||||
|
"origin": "same-origin",
|
||||||
|
"source_protocol": "http",
|
||||||
|
"target_protocol": "https",
|
||||||
|
"subresource": "img-tag",
|
||||||
|
"subresource_path": "/referrer-policy/generic/subresource/image.py",
|
||||||
|
"referrer_url": "omitted"
|
||||||
|
},
|
||||||
|
document.querySelector("meta[name=assert]").content,
|
||||||
|
new SanityChecker()
|
||||||
|
).start();
|
||||||
|
</script>
|
||||||
|
<div id="log"></div>
|
||||||
|
</body>
|
||||||
|
</html>
|
|
@ -0,0 +1,40 @@
|
||||||
|
<!DOCTYPE html>
|
||||||
|
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||||
|
<html>
|
||||||
|
<head>
|
||||||
|
<title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
|
||||||
|
<meta name="description" content="Check that sub-resource never gets the referrer URL.">
|
||||||
|
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||||
|
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-no-referrer">
|
||||||
|
<meta name="assert" content="The referrer URL is omitted when a
|
||||||
|
document served over http requires an https
|
||||||
|
sub-resource via img-tag using the attr-referrer
|
||||||
|
delivery method with swap-origin-redirect and when
|
||||||
|
the target request is same-origin.">
|
||||||
|
<script src="/resources/testharness.js"></script>
|
||||||
|
<script src="/resources/testharnessreport.js"></script>
|
||||||
|
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||||
|
<script src="/referrer-policy/generic/common.js"></script>
|
||||||
|
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||||
|
</head>
|
||||||
|
<body>
|
||||||
|
<script>
|
||||||
|
ReferrerPolicyTestCase(
|
||||||
|
{
|
||||||
|
"referrer_policy": "no-referrer",
|
||||||
|
"delivery_method": "attr-referrer",
|
||||||
|
"redirection": "swap-origin-redirect",
|
||||||
|
"origin": "same-origin",
|
||||||
|
"source_protocol": "http",
|
||||||
|
"target_protocol": "https",
|
||||||
|
"subresource": "img-tag",
|
||||||
|
"subresource_path": "/referrer-policy/generic/subresource/image.py",
|
||||||
|
"referrer_url": "omitted"
|
||||||
|
},
|
||||||
|
document.querySelector("meta[name=assert]").content,
|
||||||
|
new SanityChecker()
|
||||||
|
).start();
|
||||||
|
</script>
|
||||||
|
<div id="log"></div>
|
||||||
|
</body>
|
||||||
|
</html>
|
|
@ -0,0 +1,40 @@
|
||||||
|
<!DOCTYPE html>
|
||||||
|
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||||
|
<html>
|
||||||
|
<head>
|
||||||
|
<title>Referrer-Policy: Referrer Policy is set to 'origin-only'</title>
|
||||||
|
<meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
|
||||||
|
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||||
|
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-origin">
|
||||||
|
<meta name="assert" content="The referrer URL is origin when a
|
||||||
|
document served over http requires an http
|
||||||
|
sub-resource via iframe-tag using the attr-referrer
|
||||||
|
delivery method with keep-origin-redirect and when
|
||||||
|
the target request is cross-origin.">
|
||||||
|
<script src="/resources/testharness.js"></script>
|
||||||
|
<script src="/resources/testharnessreport.js"></script>
|
||||||
|
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||||
|
<script src="/referrer-policy/generic/common.js"></script>
|
||||||
|
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||||
|
</head>
|
||||||
|
<body>
|
||||||
|
<script>
|
||||||
|
ReferrerPolicyTestCase(
|
||||||
|
{
|
||||||
|
"referrer_policy": "origin",
|
||||||
|
"delivery_method": "attr-referrer",
|
||||||
|
"redirection": "keep-origin-redirect",
|
||||||
|
"origin": "cross-origin",
|
||||||
|
"source_protocol": "http",
|
||||||
|
"target_protocol": "http",
|
||||||
|
"subresource": "iframe-tag",
|
||||||
|
"subresource_path": "/referrer-policy/generic/subresource/document.py",
|
||||||
|
"referrer_url": "origin"
|
||||||
|
},
|
||||||
|
document.querySelector("meta[name=assert]").content,
|
||||||
|
new SanityChecker()
|
||||||
|
).start();
|
||||||
|
</script>
|
||||||
|
<div id="log"></div>
|
||||||
|
</body>
|
||||||
|
</html>
|
|
@ -0,0 +1,40 @@
|
||||||
|
<!DOCTYPE html>
|
||||||
|
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||||
|
<html>
|
||||||
|
<head>
|
||||||
|
<title>Referrer-Policy: Referrer Policy is set to 'origin-only'</title>
|
||||||
|
<meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
|
||||||
|
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||||
|
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-origin">
|
||||||
|
<meta name="assert" content="The referrer URL is origin when a
|
||||||
|
document served over http requires an http
|
||||||
|
sub-resource via iframe-tag using the attr-referrer
|
||||||
|
delivery method with no-redirect and when
|
||||||
|
the target request is cross-origin.">
|
||||||
|
<script src="/resources/testharness.js"></script>
|
||||||
|
<script src="/resources/testharnessreport.js"></script>
|
||||||
|
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||||
|
<script src="/referrer-policy/generic/common.js"></script>
|
||||||
|
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||||
|
</head>
|
||||||
|
<body>
|
||||||
|
<script>
|
||||||
|
ReferrerPolicyTestCase(
|
||||||
|
{
|
||||||
|
"referrer_policy": "origin",
|
||||||
|
"delivery_method": "attr-referrer",
|
||||||
|
"redirection": "no-redirect",
|
||||||
|
"origin": "cross-origin",
|
||||||
|
"source_protocol": "http",
|
||||||
|
"target_protocol": "http",
|
||||||
|
"subresource": "iframe-tag",
|
||||||
|
"subresource_path": "/referrer-policy/generic/subresource/document.py",
|
||||||
|
"referrer_url": "origin"
|
||||||
|
},
|
||||||
|
document.querySelector("meta[name=assert]").content,
|
||||||
|
new SanityChecker()
|
||||||
|
).start();
|
||||||
|
</script>
|
||||||
|
<div id="log"></div>
|
||||||
|
</body>
|
||||||
|
</html>
|
|
@ -0,0 +1,40 @@
|
||||||
|
<!DOCTYPE html>
|
||||||
|
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||||
|
<html>
|
||||||
|
<head>
|
||||||
|
<title>Referrer-Policy: Referrer Policy is set to 'origin-only'</title>
|
||||||
|
<meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
|
||||||
|
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||||
|
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-origin">
|
||||||
|
<meta name="assert" content="The referrer URL is origin when a
|
||||||
|
document served over http requires an http
|
||||||
|
sub-resource via iframe-tag using the attr-referrer
|
||||||
|
delivery method with swap-origin-redirect and when
|
||||||
|
the target request is cross-origin.">
|
||||||
|
<script src="/resources/testharness.js"></script>
|
||||||
|
<script src="/resources/testharnessreport.js"></script>
|
||||||
|
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||||
|
<script src="/referrer-policy/generic/common.js"></script>
|
||||||
|
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||||
|
</head>
|
||||||
|
<body>
|
||||||
|
<script>
|
||||||
|
ReferrerPolicyTestCase(
|
||||||
|
{
|
||||||
|
"referrer_policy": "origin",
|
||||||
|
"delivery_method": "attr-referrer",
|
||||||
|
"redirection": "swap-origin-redirect",
|
||||||
|
"origin": "cross-origin",
|
||||||
|
"source_protocol": "http",
|
||||||
|
"target_protocol": "http",
|
||||||
|
"subresource": "iframe-tag",
|
||||||
|
"subresource_path": "/referrer-policy/generic/subresource/document.py",
|
||||||
|
"referrer_url": "origin"
|
||||||
|
},
|
||||||
|
document.querySelector("meta[name=assert]").content,
|
||||||
|
new SanityChecker()
|
||||||
|
).start();
|
||||||
|
</script>
|
||||||
|
<div id="log"></div>
|
||||||
|
</body>
|
||||||
|
</html>
|
|
@ -0,0 +1,40 @@
|
||||||
|
<!DOCTYPE html>
|
||||||
|
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||||
|
<html>
|
||||||
|
<head>
|
||||||
|
<title>Referrer-Policy: Referrer Policy is set to 'origin-only'</title>
|
||||||
|
<meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
|
||||||
|
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||||
|
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-origin">
|
||||||
|
<meta name="assert" content="The referrer URL is origin when a
|
||||||
|
document served over http requires an http
|
||||||
|
sub-resource via img-tag using the attr-referrer
|
||||||
|
delivery method with keep-origin-redirect and when
|
||||||
|
the target request is cross-origin.">
|
||||||
|
<script src="/resources/testharness.js"></script>
|
||||||
|
<script src="/resources/testharnessreport.js"></script>
|
||||||
|
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||||
|
<script src="/referrer-policy/generic/common.js"></script>
|
||||||
|
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||||
|
</head>
|
||||||
|
<body>
|
||||||
|
<script>
|
||||||
|
ReferrerPolicyTestCase(
|
||||||
|
{
|
||||||
|
"referrer_policy": "origin",
|
||||||
|
"delivery_method": "attr-referrer",
|
||||||
|
"redirection": "keep-origin-redirect",
|
||||||
|
"origin": "cross-origin",
|
||||||
|
"source_protocol": "http",
|
||||||
|
"target_protocol": "http",
|
||||||
|
"subresource": "img-tag",
|
||||||
|
"subresource_path": "/referrer-policy/generic/subresource/image.py",
|
||||||
|
"referrer_url": "origin"
|
||||||
|
},
|
||||||
|
document.querySelector("meta[name=assert]").content,
|
||||||
|
new SanityChecker()
|
||||||
|
).start();
|
||||||
|
</script>
|
||||||
|
<div id="log"></div>
|
||||||
|
</body>
|
||||||
|
</html>
|
|
@ -0,0 +1,40 @@
|
||||||
|
<!DOCTYPE html>
|
||||||
|
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||||
|
<html>
|
||||||
|
<head>
|
||||||
|
<title>Referrer-Policy: Referrer Policy is set to 'origin-only'</title>
|
||||||
|
<meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
|
||||||
|
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||||
|
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-origin">
|
||||||
|
<meta name="assert" content="The referrer URL is origin when a
|
||||||
|
document served over http requires an http
|
||||||
|
sub-resource via img-tag using the attr-referrer
|
||||||
|
delivery method with no-redirect and when
|
||||||
|
the target request is cross-origin.">
|
||||||
|
<script src="/resources/testharness.js"></script>
|
||||||
|
<script src="/resources/testharnessreport.js"></script>
|
||||||
|
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||||
|
<script src="/referrer-policy/generic/common.js"></script>
|
||||||
|
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||||
|
</head>
|
||||||
|
<body>
|
||||||
|
<script>
|
||||||
|
ReferrerPolicyTestCase(
|
||||||
|
{
|
||||||
|
"referrer_policy": "origin",
|
||||||
|
"delivery_method": "attr-referrer",
|
||||||
|
"redirection": "no-redirect",
|
||||||
|
"origin": "cross-origin",
|
||||||
|
"source_protocol": "http",
|
||||||
|
"target_protocol": "http",
|
||||||
|
"subresource": "img-tag",
|
||||||
|
"subresource_path": "/referrer-policy/generic/subresource/image.py",
|
||||||
|
"referrer_url": "origin"
|
||||||
|
},
|
||||||
|
document.querySelector("meta[name=assert]").content,
|
||||||
|
new SanityChecker()
|
||||||
|
).start();
|
||||||
|
</script>
|
||||||
|
<div id="log"></div>
|
||||||
|
</body>
|
||||||
|
</html>
|
Some files were not shown because too many files have changed in this diff Show more
Loading…
Add table
Add a link
Reference in a new issue