mirror of
https://github.com/servo/servo.git
synced 2025-08-05 05:30:08 +01:00
Update web-platform-tests to revision b'fef1c092193085ce2fa64fd116484ba0f3c0dbb1'
This commit is contained in:
parent
45f5d84d1b
commit
6b8f08a140
543 changed files with 24225 additions and 722 deletions
|
@ -1,4 +0,0 @@
|
||||||
[hit-test-floats-002.html]
|
|
||||||
[Hit test float]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
|
@ -2,9 +2,6 @@
|
||||||
[Test @font-face matching for weight 99]
|
[Test @font-face matching for weight 99]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Test @font-face matching for weight 420]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Test @font-face matching for weight 600]
|
[Test @font-face matching for weight 600]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
|
|
@ -315,12 +315,12 @@
|
||||||
[<iframe>: combined response Content-Type: text/html;" \\" text/plain]
|
[<iframe>: combined response Content-Type: text/html;" \\" text/plain]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[<iframe>: separate response Content-Type: text/html */*;charset=gbk]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[<iframe>: combined response Content-Type: text/html */*;charset=gbk]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[<iframe>: combined response Content-Type: text/html;" text/plain]
|
[<iframe>: combined response Content-Type: text/html;" text/plain]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
[<iframe>: combined response Content-Type: text/html;charset=gbk text/plain text/html]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[<iframe>: separate response Content-Type: text/html;" text/plain]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
|
|
@ -53,12 +53,3 @@
|
||||||
[combined text/javascript ]
|
[combined text/javascript ]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[separate text/javascript x/x]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[separate text/javascript; charset=windows-1252 text/javascript]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[separate text/javascript;charset=windows-1252 text/javascript]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
|
|
|
@ -1,4 +0,0 @@
|
||||||
[traverse_the_history_1.html]
|
|
||||||
[Multiple history traversals from the same task]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
|
@ -0,0 +1,4 @@
|
||||||
|
[traverse_the_history_5.html]
|
||||||
|
[Multiple history traversals, last would be aborted]
|
||||||
|
expected: FAIL
|
||||||
|
|
|
@ -1,2 +0,0 @@
|
||||||
[cross-origin-objects-on-new-window.html]
|
|
||||||
expected: TIMEOUT
|
|
|
@ -1,5 +1,5 @@
|
||||||
[parent-yes-1-no-same-2-no-subdomain.sub.https.html]
|
[parent-yes-1-no-same-2-no-subdomain.sub.https.html]
|
||||||
expected: TIMEOUT
|
expected: CRASH
|
||||||
[after parent: originAgentCluster must equal true]
|
[after parent: originAgentCluster must equal true]
|
||||||
expected: NOTRUN
|
expected: NOTRUN
|
||||||
|
|
||||||
|
|
|
@ -1,4 +0,0 @@
|
||||||
[creating_browsing_context_test_01.html]
|
|
||||||
[first argument: absolute url]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
|
@ -1,5 +1,5 @@
|
||||||
[embedded-opener-remove-frame.html]
|
[embedded-opener-remove-frame.html]
|
||||||
expected: TIMEOUT
|
expected: CRASH
|
||||||
[opener of discarded nested browsing context]
|
[opener of discarded nested browsing context]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
|
|
@ -3459,3 +3459,15 @@
|
||||||
[HTMLMediaElement interface: document.createElement("video") must inherit property "preservesPitch" with the proper type]
|
[HTMLMediaElement interface: document.createElement("video") must inherit property "preservesPitch" with the proper type]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
[HTMLSourceElement interface: attribute width]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[HTMLSourceElement interface: attribute height]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[HTMLSourceElement interface: document.createElement("source") must inherit property "width" with the proper type]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[HTMLSourceElement interface: document.createElement("source") must inherit property "height" with the proper type]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
|
|
@ -4,14 +4,14 @@
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Host element with delegatesFocus including no focusable descendants should be skipped]
|
[Host element with delegatesFocus including no focusable descendants should be skipped]
|
||||||
expected: FAIL
|
expected: NOTRUN
|
||||||
|
|
||||||
[Element with tabindex should support autofocus]
|
[Element with tabindex should support autofocus]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Area element should support autofocus]
|
[Area element should support autofocus]
|
||||||
expected: TIMEOUT
|
expected: NOTRUN
|
||||||
|
|
||||||
[Host element with delegatesFocus should support autofocus]
|
[Host element with delegatesFocus should support autofocus]
|
||||||
expected: FAIL
|
expected: TIMEOUT
|
||||||
|
|
||||||
|
|
|
@ -0,0 +1,2 @@
|
||||||
|
[table-column-width.html]
|
||||||
|
expected: CRASH
|
|
@ -2,3 +2,36 @@
|
||||||
[Computed style]
|
[Computed style]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
[source width and height attributes are used to infer aspect-ratio in <picture>]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Computed style for width/height/aspect-ratio]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Source width/height should take precedence over img attributes.]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Make sure style gets invalidated correctly when the source gets removed.]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[If the <source> has only one of width/height, we don't get an aspect ratio, even if the <img> has both.]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[If we don't have width/height on the source, we fall back to width/height on the <img>.]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[If we only have one width/height attribute, we should get that attribute mapped but no aspect ratio, even if <img> has attributes.]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Dynamically changing width/height should change computed style]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Changing which <source> matches should change computed style]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Percentages on source should be ignored for aspect-ratio but used for width/height.]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Trailing garbage should be ignored but not make the attribute invalid]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
|
|
@ -1,5 +1,5 @@
|
||||||
[iframe_sandbox_popups_escaping-2.html]
|
[iframe_sandbox_popups_escaping-2.html]
|
||||||
expected: TIMEOUT
|
expected: CRASH
|
||||||
[Check that popups from a sandboxed iframe escape the sandbox if\n allow-popups-to-escape-sandbox is used]
|
[Check that popups from a sandboxed iframe escape the sandbox if\n allow-popups-to-escape-sandbox is used]
|
||||||
expected: TIMEOUT
|
expected: TIMEOUT
|
||||||
|
|
||||||
|
|
|
@ -1,4 +1,5 @@
|
||||||
[iframe_sandbox_popups_escaping-3.html]
|
[iframe_sandbox_popups_escaping-3.html]
|
||||||
|
expected: TIMEOUT
|
||||||
[Check that popups from a sandboxed iframe escape the sandbox if\n allow-popups-to-escape-sandbox is used]
|
[Check that popups from a sandboxed iframe escape the sandbox if\n allow-popups-to-escape-sandbox is used]
|
||||||
expected: FAIL
|
expected: TIMEOUT
|
||||||
|
|
||||||
|
|
|
@ -1,5 +1,5 @@
|
||||||
[iframe_sandbox_popups_nonescaping-1.html]
|
[iframe_sandbox_popups_nonescaping-1.html]
|
||||||
expected: TIMEOUT
|
expected: CRASH
|
||||||
[Check that popups from a sandboxed iframe do not escape the sandbox]
|
[Check that popups from a sandboxed iframe do not escape the sandbox]
|
||||||
expected: NOTRUN
|
expected: NOTRUN
|
||||||
|
|
||||||
|
|
|
@ -1,4 +1,5 @@
|
||||||
[iframe_sandbox_popups_nonescaping-3.html]
|
[iframe_sandbox_popups_nonescaping-3.html]
|
||||||
|
expected: CRASH
|
||||||
[Check that popups from a sandboxed iframe do not escape the sandbox]
|
[Check that popups from a sandboxed iframe do not escape the sandbox]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
|
|
@ -1,4 +0,0 @@
|
||||||
[form-double-submit-2.html]
|
|
||||||
[preventDefault should allow onclick submit() to succeed]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
|
@ -2,57 +2,75 @@
|
||||||
[input type text: selectionStart a second time (must not fire select)]
|
[input type text: selectionStart a second time (must not fire select)]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[textarea: selectionDirection a second time (must not fire select)]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[input type url: setRangeText() a second time (must not fire select)]
|
[input type url: setRangeText() a second time (must not fire select)]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[input type search: setRangeText() a second time (must not fire select)]
|
[input type search: setRangeText() a second time (must not fire select)]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[input type search: setSelectionRange out of range a second time (must not fire select)]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[textarea: setSelectionRange() a second time (must not fire select)]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[input type text: selectionEnd a second time (must not fire select)]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[input type search: selectionEnd a second time (must not fire select)]
|
[input type search: selectionEnd a second time (must not fire select)]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[input type tel: setSelectionRange() a second time (must not fire select)]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[input type tel: selectionEnd out of range a second time (must not fire select)]
|
[input type tel: selectionEnd out of range a second time (must not fire select)]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[input type password: selectionDirection a second time (must not fire select)]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[textarea: selectionStart out of range a second time (must not fire select)]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[textarea: selectionEnd out of range a second time (must not fire select)]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[textarea: setSelectionRange out of range a second time (must not fire select)]
|
[textarea: setSelectionRange out of range a second time (must not fire select)]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[input type text: selectionEnd out of range a second time (must not fire select)]
|
[input type text: selectionEnd out of range a second time (must not fire select)]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[input type text: setSelectionRange out of range a second time (must not fire select)]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[input type url: selectionStart out of range a second time (must not fire select)]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[input type url: setSelectionRange out of range a second time (must not fire select)]
|
[input type url: setSelectionRange out of range a second time (must not fire select)]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[input type password: selectionEnd out of range a second time (must not fire select)]
|
[input type password: selectionEnd out of range a second time (must not fire select)]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
[textarea: selectionEnd a second time (must not fire select)]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[textarea: setRangeText() a second time (must not fire select)]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[input type text: setSelectionRange() a second time (must not fire select)]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[input type text: setRangeText() a second time (must not fire select)]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[input type text: selectionStart out of range a second time (must not fire select)]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[input type search: selectionDirection a second time (must not fire select)]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[input type search: selectionEnd out of range a second time (must not fire select)]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[input type tel: selectionDirection a second time (must not fire select)]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[input type tel: selectionStart out of range a second time (must not fire select)]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[input type url: select() a second time (must not fire select)]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[input type url: selectionStart a second time (must not fire select)]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[input type url: setSelectionRange() a second time (must not fire select)]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[input type url: selectionEnd out of range a second time (must not fire select)]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[input type password: selectionEnd a second time (must not fire select)]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[input type password: setRangeText() a second time (must not fire select)]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[input type password: setSelectionRange out of range a second time (must not fire select)]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
|
|
@ -1,13 +1,14 @@
|
||||||
[htmlanchorelement_noopener.html]
|
[htmlanchorelement_noopener.html]
|
||||||
|
expected: TIMEOUT
|
||||||
[Check that targeting of rel=noopener with a given name reuses an existing window with that name]
|
[Check that targeting of rel=noopener with a given name reuses an existing window with that name]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Check that rel=noopener with target=_top does a normal load]
|
[Check that rel=noopener with target=_top does a normal load]
|
||||||
expected: FAIL
|
expected: NOTRUN
|
||||||
|
|
||||||
[Check that rel=noopener with target=_parent does a normal load]
|
[Check that rel=noopener with target=_parent does a normal load]
|
||||||
expected: FAIL
|
expected: NOTRUN
|
||||||
|
|
||||||
[Check that rel=noopener with target=_self does a normal load]
|
[Check that rel=noopener with target=_self does a normal load]
|
||||||
expected: FAIL
|
expected: NOTRUN
|
||||||
|
|
||||||
|
|
|
@ -0,0 +1,2 @@
|
||||||
|
[dynamic-import-with-assertion-argument.html]
|
||||||
|
expected: ERROR
|
|
@ -1,4 +0,0 @@
|
||||||
[DOMContentLoaded-defer.html]
|
|
||||||
[The end: DOMContentLoaded and defer scripts]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
|
@ -0,0 +1,4 @@
|
||||||
|
[module-delayed.html]
|
||||||
|
[async document.write in a module]
|
||||||
|
expected: FAIL
|
||||||
|
|
|
@ -1,5 +1,4 @@
|
||||||
[realtimeanalyser-fft-scaling.html]
|
[realtimeanalyser-fft-scaling.html]
|
||||||
expected: TIMEOUT
|
|
||||||
[X 2048-point FFT peak position is not equal to 64. Got 0.]
|
[X 2048-point FFT peak position is not equal to 64. Got 0.]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
|
|
@ -1,4 +1,5 @@
|
||||||
[audiocontext-not-fully-active.html]
|
[audiocontext-not-fully-active.html]
|
||||||
|
expected: TIMEOUT
|
||||||
[frame in navigated remote-site frame]
|
[frame in navigated remote-site frame]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
|
|
@ -11,3 +11,9 @@
|
||||||
[test_bidi_session_3[capabilities0-True\]]
|
[test_bidi_session_3[capabilities0-True\]]
|
||||||
expected: ERROR
|
expected: ERROR
|
||||||
|
|
||||||
|
[test_bidi_session_send]
|
||||||
|
expected: ERROR
|
||||||
|
|
||||||
|
[test_bidi_session_with_different_capability[capabilities0\]]
|
||||||
|
expected: ERROR
|
||||||
|
|
||||||
|
|
|
@ -2,9 +2,3 @@
|
||||||
[test_element_in_object]
|
[test_element_in_object]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[test_array_in_object]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[test_object_in_array]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
|
|
|
@ -0,0 +1,5 @@
|
||||||
|
[017.html]
|
||||||
|
expected: TIMEOUT
|
||||||
|
[origin of the script that invoked the method, about:blank]
|
||||||
|
expected: TIMEOUT
|
||||||
|
|
|
@ -1,5 +0,0 @@
|
||||||
[018.html]
|
|
||||||
expected: TIMEOUT
|
|
||||||
[origin of the script that invoked the method, javascript:]
|
|
||||||
expected: TIMEOUT
|
|
||||||
|
|
|
@ -1,5 +1,4 @@
|
||||||
[import-in-moduleworker.html]
|
[import-in-moduleworker.html]
|
||||||
expected: ERROR
|
|
||||||
[Base URL in module dedicated workers: import]
|
[Base URL in module dedicated workers: import]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
|
|
@ -1,4 +1,5 @@
|
||||||
[sharedworker-in-worker.html]
|
[sharedworker-in-worker.html]
|
||||||
|
expected: ERROR
|
||||||
[Base URL in workers: new SharedWorker()]
|
[Base URL in workers: new SharedWorker()]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
|
File diff suppressed because it is too large
Load diff
|
@ -1,4 +0,0 @@
|
||||||
[hit-test-floats-002.html]
|
|
||||||
[Hit test float]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
|
@ -17,9 +17,6 @@
|
||||||
[Test @font-face matching for weight 399]
|
[Test @font-face matching for weight 399]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Test @font-face matching for weight 420]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[Test @font-face matching for weight 400]
|
[Test @font-face matching for weight 400]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
|
|
@ -315,12 +315,12 @@
|
||||||
[<iframe>: combined response Content-Type: text/html;" \\" text/plain]
|
[<iframe>: combined response Content-Type: text/html;" \\" text/plain]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[<iframe>: separate response Content-Type: text/html */*;charset=gbk]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[<iframe>: combined response Content-Type: text/html */*;charset=gbk]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[<iframe>: combined response Content-Type: text/html;" text/plain]
|
[<iframe>: combined response Content-Type: text/html;" text/plain]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
[<iframe>: combined response Content-Type: text/html;charset=gbk text/plain text/html]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[<iframe>: separate response Content-Type: text/html;" text/plain]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
|
|
@ -53,12 +53,3 @@
|
||||||
[combined text/javascript ]
|
[combined text/javascript ]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[separate text/javascript x/x]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[separate text/javascript; charset=windows-1252 text/javascript]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[separate text/javascript;charset=windows-1252 text/javascript]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
|
|
|
@ -1,4 +0,0 @@
|
||||||
[traverse_the_history_1.html]
|
|
||||||
[Multiple history traversals from the same task]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
|
@ -0,0 +1,4 @@
|
||||||
|
[traverse_the_history_5.html]
|
||||||
|
[Multiple history traversals, last would be aborted]
|
||||||
|
expected: FAIL
|
||||||
|
|
|
@ -1,2 +0,0 @@
|
||||||
[cross-origin-objects-on-new-window.html]
|
|
||||||
expected: TIMEOUT
|
|
|
@ -1,4 +1,5 @@
|
||||||
[parent-yes-1-no-same-2-no-subdomain.sub.https.html]
|
[parent-yes-1-no-same-2-no-subdomain.sub.https.html]
|
||||||
|
expected: CRASH
|
||||||
[after parent: originAgentCluster must equal true]
|
[after parent: originAgentCluster must equal true]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
|
|
@ -1,4 +0,0 @@
|
||||||
[creating_browsing_context_test_01.html]
|
|
||||||
[first argument: absolute url]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
|
@ -1,5 +1,5 @@
|
||||||
[embedded-opener-remove-frame.html]
|
[embedded-opener-remove-frame.html]
|
||||||
expected: TIMEOUT
|
expected: CRASH
|
||||||
[opener and "removed" embedded documents]
|
[opener and "removed" embedded documents]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
|
|
@ -3771,3 +3771,15 @@
|
||||||
[HTMLMediaElement interface: document.createElement("video") must inherit property "preservesPitch" with the proper type]
|
[HTMLMediaElement interface: document.createElement("video") must inherit property "preservesPitch" with the proper type]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
[HTMLSourceElement interface: attribute width]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[HTMLSourceElement interface: attribute height]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[HTMLSourceElement interface: document.createElement("source") must inherit property "width" with the proper type]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[HTMLSourceElement interface: document.createElement("source") must inherit property "height" with the proper type]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
|
|
@ -7,11 +7,11 @@
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Host element with delegatesFocus including no focusable descendants should be skipped]
|
[Host element with delegatesFocus including no focusable descendants should be skipped]
|
||||||
expected: FAIL
|
expected: NOTRUN
|
||||||
|
|
||||||
[Area element should support autofocus]
|
[Area element should support autofocus]
|
||||||
expected: TIMEOUT
|
expected: NOTRUN
|
||||||
|
|
||||||
[Host element with delegatesFocus should support autofocus]
|
[Host element with delegatesFocus should support autofocus]
|
||||||
expected: FAIL
|
expected: TIMEOUT
|
||||||
|
|
||||||
|
|
|
@ -1,2 +1,2 @@
|
||||||
[table-column-width.html]
|
[table-column-width.html]
|
||||||
expected: TIMEOUT
|
expected: CRASH
|
||||||
|
|
|
@ -2,3 +2,36 @@
|
||||||
[Computed style]
|
[Computed style]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
[source width and height attributes are used to infer aspect-ratio in <picture>]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Computed style for width/height/aspect-ratio]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Source width/height should take precedence over img attributes.]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Make sure style gets invalidated correctly when the source gets removed.]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[If the <source> has only one of width/height, we don't get an aspect ratio, even if the <img> has both.]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[If we don't have width/height on the source, we fall back to width/height on the <img>.]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[If we only have one width/height attribute, we should get that attribute mapped but no aspect ratio, even if <img> has attributes.]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Dynamically changing width/height should change computed style]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Changing which <source> matches should change computed style]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Percentages on source should be ignored for aspect-ratio but used for width/height.]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[Trailing garbage should be ignored but not make the attribute invalid]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
|
|
@ -1,5 +1,5 @@
|
||||||
[iframe_sandbox_popups_escaping-2.html]
|
[iframe_sandbox_popups_escaping-2.html]
|
||||||
expected: TIMEOUT
|
expected: CRASH
|
||||||
[Check that popups from a sandboxed iframe escape the sandbox if\n allow-popups-to-escape-sandbox is used]
|
[Check that popups from a sandboxed iframe escape the sandbox if\n allow-popups-to-escape-sandbox is used]
|
||||||
expected: TIMEOUT
|
expected: TIMEOUT
|
||||||
|
|
||||||
|
|
|
@ -1,5 +1,6 @@
|
||||||
[iframe_sandbox_popups_escaping-3.html]
|
[iframe_sandbox_popups_escaping-3.html]
|
||||||
type: testharness
|
type: testharness
|
||||||
|
expected: TIMEOUT
|
||||||
[Check that popups from a sandboxed iframe escape the sandbox if\n allow-popups-to-escape-sandbox is used]
|
[Check that popups from a sandboxed iframe escape the sandbox if\n allow-popups-to-escape-sandbox is used]
|
||||||
expected: FAIL
|
expected: TIMEOUT
|
||||||
|
|
||||||
|
|
|
@ -1,6 +1,6 @@
|
||||||
[iframe_sandbox_popups_nonescaping-1.html]
|
[iframe_sandbox_popups_nonescaping-1.html]
|
||||||
type: testharness
|
type: testharness
|
||||||
expected: TIMEOUT
|
expected: CRASH
|
||||||
[Check that popups from a sandboxed iframe do not escape the sandbox]
|
[Check that popups from a sandboxed iframe do not escape the sandbox]
|
||||||
expected: NOTRUN
|
expected: NOTRUN
|
||||||
|
|
||||||
|
|
|
@ -1,4 +1,5 @@
|
||||||
[iframe_sandbox_popups_nonescaping-3.html]
|
[iframe_sandbox_popups_nonescaping-3.html]
|
||||||
|
expected: CRASH
|
||||||
[Check that popups from a sandboxed iframe do not escape the sandbox]
|
[Check that popups from a sandboxed iframe do not escape the sandbox]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
|
|
@ -1,4 +0,0 @@
|
||||||
[form-double-submit-2.html]
|
|
||||||
[preventDefault should allow onclick submit() to succeed]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
|
@ -2,57 +2,75 @@
|
||||||
[input type text: selectionStart a second time (must not fire select)]
|
[input type text: selectionStart a second time (must not fire select)]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[textarea: selectionDirection a second time (must not fire select)]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[input type url: setRangeText() a second time (must not fire select)]
|
[input type url: setRangeText() a second time (must not fire select)]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[input type search: setRangeText() a second time (must not fire select)]
|
[input type search: setRangeText() a second time (must not fire select)]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[input type search: setSelectionRange out of range a second time (must not fire select)]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[textarea: setSelectionRange() a second time (must not fire select)]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[input type text: selectionEnd a second time (must not fire select)]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[input type search: selectionEnd a second time (must not fire select)]
|
[input type search: selectionEnd a second time (must not fire select)]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[input type tel: setSelectionRange() a second time (must not fire select)]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[input type tel: selectionEnd out of range a second time (must not fire select)]
|
[input type tel: selectionEnd out of range a second time (must not fire select)]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[input type password: selectionDirection a second time (must not fire select)]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[textarea: selectionStart out of range a second time (must not fire select)]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[textarea: selectionEnd out of range a second time (must not fire select)]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[textarea: setSelectionRange out of range a second time (must not fire select)]
|
[textarea: setSelectionRange out of range a second time (must not fire select)]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[input type text: selectionEnd out of range a second time (must not fire select)]
|
[input type text: selectionEnd out of range a second time (must not fire select)]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[input type text: setSelectionRange out of range a second time (must not fire select)]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[input type url: selectionStart out of range a second time (must not fire select)]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[input type url: setSelectionRange out of range a second time (must not fire select)]
|
[input type url: setSelectionRange out of range a second time (must not fire select)]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[input type password: selectionEnd out of range a second time (must not fire select)]
|
[input type password: selectionEnd out of range a second time (must not fire select)]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
[textarea: selectionEnd a second time (must not fire select)]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[textarea: setRangeText() a second time (must not fire select)]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[input type text: setSelectionRange() a second time (must not fire select)]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[input type text: setRangeText() a second time (must not fire select)]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[input type text: selectionStart out of range a second time (must not fire select)]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[input type search: selectionDirection a second time (must not fire select)]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[input type search: selectionEnd out of range a second time (must not fire select)]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[input type tel: selectionDirection a second time (must not fire select)]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[input type tel: selectionStart out of range a second time (must not fire select)]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[input type url: select() a second time (must not fire select)]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[input type url: selectionStart a second time (must not fire select)]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[input type url: setSelectionRange() a second time (must not fire select)]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[input type url: selectionEnd out of range a second time (must not fire select)]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[input type password: selectionEnd a second time (must not fire select)]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[input type password: setRangeText() a second time (must not fire select)]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
[input type password: setSelectionRange out of range a second time (must not fire select)]
|
||||||
|
expected: FAIL
|
||||||
|
|
||||||
|
|
|
@ -1,5 +1,6 @@
|
||||||
[htmlanchorelement_noopener.html]
|
[htmlanchorelement_noopener.html]
|
||||||
type: testharness
|
type: testharness
|
||||||
|
expected: TIMEOUT
|
||||||
[Check that targeting of rel=noopener with a given name ignores an existing window with that name]
|
[Check that targeting of rel=noopener with a given name ignores an existing window with that name]
|
||||||
expected: NOTRUN
|
expected: NOTRUN
|
||||||
|
|
||||||
|
@ -7,11 +8,11 @@
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[Check that rel=noopener with target=_top does a normal load]
|
[Check that rel=noopener with target=_top does a normal load]
|
||||||
expected: FAIL
|
expected: NOTRUN
|
||||||
|
|
||||||
[Check that rel=noopener with target=_parent does a normal load]
|
[Check that rel=noopener with target=_parent does a normal load]
|
||||||
expected: FAIL
|
expected: NOTRUN
|
||||||
|
|
||||||
[Check that rel=noopener with target=_self does a normal load]
|
[Check that rel=noopener with target=_self does a normal load]
|
||||||
expected: FAIL
|
expected: NOTRUN
|
||||||
|
|
||||||
|
|
|
@ -0,0 +1,2 @@
|
||||||
|
[dynamic-import-with-assertion-argument.html]
|
||||||
|
expected: ERROR
|
|
@ -1,4 +0,0 @@
|
||||||
[DOMContentLoaded-defer.html]
|
|
||||||
[The end: DOMContentLoaded and defer scripts]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
|
@ -0,0 +1,4 @@
|
||||||
|
[module-delayed.html]
|
||||||
|
[async document.write in a module]
|
||||||
|
expected: FAIL
|
||||||
|
|
|
@ -1,5 +1,4 @@
|
||||||
[realtimeanalyser-fft-scaling.html]
|
[realtimeanalyser-fft-scaling.html]
|
||||||
expected: TIMEOUT
|
|
||||||
[X 2048-point FFT peak position is not equal to 64. Got 0.]
|
[X 2048-point FFT peak position is not equal to 64. Got 0.]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
|
|
@ -1,4 +1,5 @@
|
||||||
[audiocontext-not-fully-active.html]
|
[audiocontext-not-fully-active.html]
|
||||||
|
expected: TIMEOUT
|
||||||
[frame in navigated remote-site frame]
|
[frame in navigated remote-site frame]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
|
|
@ -11,3 +11,9 @@
|
||||||
[test_bidi_session_3[capabilities0-True\]]
|
[test_bidi_session_3[capabilities0-True\]]
|
||||||
expected: ERROR
|
expected: ERROR
|
||||||
|
|
||||||
|
[test_bidi_session_send]
|
||||||
|
expected: ERROR
|
||||||
|
|
||||||
|
[test_bidi_session_with_different_capability[capabilities0\]]
|
||||||
|
expected: ERROR
|
||||||
|
|
||||||
|
|
|
@ -2,9 +2,3 @@
|
||||||
[test_element_in_object]
|
[test_element_in_object]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
[test_array_in_object]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
[test_object_in_array]
|
|
||||||
expected: FAIL
|
|
||||||
|
|
||||||
|
|
5
tests/wpt/metadata/webmessaging/with-ports/017.html.ini
Normal file
5
tests/wpt/metadata/webmessaging/with-ports/017.html.ini
Normal file
|
@ -0,0 +1,5 @@
|
||||||
|
[017.html]
|
||||||
|
expected: TIMEOUT
|
||||||
|
[origin of the script that invoked the method, about:blank]
|
||||||
|
expected: TIMEOUT
|
||||||
|
|
|
@ -1,5 +0,0 @@
|
||||||
[018.html]
|
|
||||||
expected: TIMEOUT
|
|
||||||
[origin of the script that invoked the method, javascript:]
|
|
||||||
expected: TIMEOUT
|
|
||||||
|
|
|
@ -1,5 +1,4 @@
|
||||||
[import-in-moduleworker.html]
|
[import-in-moduleworker.html]
|
||||||
expected: ERROR
|
|
||||||
[Base URL in module dedicated workers: import]
|
[Base URL in module dedicated workers: import]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
|
|
@ -1,4 +1,5 @@
|
||||||
[sharedworker-in-worker.html]
|
[sharedworker-in-worker.html]
|
||||||
|
expected: ERROR
|
||||||
[Base URL in workers: new SharedWorker()]
|
[Base URL in workers: new SharedWorker()]
|
||||||
expected: FAIL
|
expected: FAIL
|
||||||
|
|
||||||
|
|
|
@ -76,6 +76,43 @@ def get_test_filename(spec_directory, spec_json, selection):
|
||||||
spec_json['test_file_path_pattern'] % selection_for_filename)
|
spec_json['test_file_path_pattern'] % selection_for_filename)
|
||||||
|
|
||||||
|
|
||||||
|
def get_csp_value(value):
|
||||||
|
'''
|
||||||
|
Returns actual CSP header values (e.g. "worker-src 'self'") for the
|
||||||
|
given string used in PolicyDelivery's value (e.g. "worker-src-self").
|
||||||
|
'''
|
||||||
|
|
||||||
|
# script-src
|
||||||
|
# Test-related scripts like testharness.js and inline scripts containing
|
||||||
|
# test bodies.
|
||||||
|
# 'unsafe-inline' is added as a workaround here. This is probably not so
|
||||||
|
# bad, as it shouldn't intefere non-inline-script requests that we want to
|
||||||
|
# test.
|
||||||
|
if value == 'script-src-wildcard':
|
||||||
|
return "script-src * 'unsafe-inline'"
|
||||||
|
if value == 'script-src-self':
|
||||||
|
return "script-src 'self' 'unsafe-inline'"
|
||||||
|
# Workaround for "script-src 'none'" would be more complicated, because
|
||||||
|
# - "script-src 'none' 'unsafe-inline'" is handled somehow differently from
|
||||||
|
# "script-src 'none'", i.e.
|
||||||
|
# https://w3c.github.io/webappsec-csp/#match-url-to-source-list Step 3
|
||||||
|
# handles the latter but not the former.
|
||||||
|
# - We need nonce- or path-based additional values to allow same-origin
|
||||||
|
# test scripts like testharness.js.
|
||||||
|
# Therefore, we disable 'script-src-none' tests for now in
|
||||||
|
# `/content-security-policy/spec.src.json`.
|
||||||
|
if value == 'script-src-none':
|
||||||
|
return "script-src 'none'"
|
||||||
|
|
||||||
|
# worker-src
|
||||||
|
if value == 'worker-src-wildcard':
|
||||||
|
return 'worker-src *'
|
||||||
|
if value == 'worker-src-self':
|
||||||
|
return "worker-src 'self'"
|
||||||
|
if value == 'worker-src-none':
|
||||||
|
return "worker-src 'none'"
|
||||||
|
raise Exception('Invalid delivery_value: %s' % value)
|
||||||
|
|
||||||
def handle_deliveries(policy_deliveries):
|
def handle_deliveries(policy_deliveries):
|
||||||
'''
|
'''
|
||||||
Generate <meta> elements and HTTP headers for the given list of
|
Generate <meta> elements and HTTP headers for the given list of
|
||||||
|
@ -110,6 +147,16 @@ def handle_deliveries(policy_deliveries):
|
||||||
else:
|
else:
|
||||||
raise Exception(
|
raise Exception(
|
||||||
'Invalid delivery_type: %s' % delivery.delivery_type)
|
'Invalid delivery_type: %s' % delivery.delivery_type)
|
||||||
|
elif delivery.key == 'contentSecurityPolicy':
|
||||||
|
csp_value = get_csp_value(delivery.value)
|
||||||
|
if delivery.delivery_type == 'meta':
|
||||||
|
meta += '<meta http-equiv="Content-Security-Policy" ' + \
|
||||||
|
'content="' + csp_value + '">'
|
||||||
|
elif delivery.delivery_type == 'http-rp':
|
||||||
|
headers['Content-Security-Policy'] = csp_value
|
||||||
|
else:
|
||||||
|
raise Exception(
|
||||||
|
'Invalid delivery_type: %s' % delivery.delivery_type)
|
||||||
elif delivery.key == 'upgradeInsecureRequests':
|
elif delivery.key == 'upgradeInsecureRequests':
|
||||||
# https://w3c.github.io/webappsec-upgrade-insecure-requests/#delivery
|
# https://w3c.github.io/webappsec-upgrade-insecure-requests/#delivery
|
||||||
assert (delivery.value == 'upgrade')
|
assert (delivery.value == 'upgrade')
|
||||||
|
|
|
@ -94,16 +94,23 @@
|
||||||
"delivery_value": "*",
|
"delivery_value": "*",
|
||||||
"redirection": "*",
|
"redirection": "*",
|
||||||
"subresource": [
|
"subresource": [
|
||||||
"area-tag",
|
|
||||||
"a-tag",
|
"a-tag",
|
||||||
|
"area-tag",
|
||||||
|
"audio-tag",
|
||||||
|
"beacon",
|
||||||
"fetch",
|
"fetch",
|
||||||
"iframe-tag",
|
"iframe-tag",
|
||||||
"img-tag",
|
"img-tag",
|
||||||
|
"link-css-tag",
|
||||||
|
"link-prefetch-tag",
|
||||||
|
"object-tag",
|
||||||
|
"picture-tag",
|
||||||
"script-tag",
|
"script-tag",
|
||||||
"sharedworker-classic",
|
"sharedworker-classic",
|
||||||
"sharedworker-import",
|
"sharedworker-import",
|
||||||
"sharedworker-import-data",
|
"sharedworker-import-data",
|
||||||
"sharedworker-module",
|
"sharedworker-module",
|
||||||
|
"video-tag",
|
||||||
"worker-classic",
|
"worker-classic",
|
||||||
"worker-import",
|
"worker-import",
|
||||||
"worker-import-data",
|
"worker-import-data",
|
||||||
|
@ -127,6 +134,27 @@
|
||||||
"cross-ws-downgrade"
|
"cross-ws-downgrade"
|
||||||
],
|
],
|
||||||
"expectation": "*"
|
"expectation": "*"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
// Worklets are HTTPS contexts only
|
||||||
|
"expansion": "*",
|
||||||
|
"source_scheme": "http",
|
||||||
|
"source_context_list": "*",
|
||||||
|
"delivery_type": "*",
|
||||||
|
"delivery_value": "*",
|
||||||
|
"redirection": "*",
|
||||||
|
"subresource": [
|
||||||
|
"worklet-animation",
|
||||||
|
"worklet-animation-import-data",
|
||||||
|
"worklet-audio",
|
||||||
|
"worklet-audio-import-data",
|
||||||
|
"worklet-layout",
|
||||||
|
"worklet-layout-import-data",
|
||||||
|
"worklet-paint",
|
||||||
|
"worklet-paint-import-data"
|
||||||
|
],
|
||||||
|
"origin": "*",
|
||||||
|
"expectation": "*"
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"source_context_schema": {
|
"source_context_schema": {
|
||||||
|
|
|
@ -122,6 +122,8 @@ class PolicyDelivery(object):
|
||||||
raise ShouldSkip()
|
raise ShouldSkip()
|
||||||
policy_delivery = target_policy_delivery
|
policy_delivery = target_policy_delivery
|
||||||
elif obj == "anotherPolicy":
|
elif obj == "anotherPolicy":
|
||||||
|
if len(supported_delivery_types) == 0:
|
||||||
|
raise ShouldSkip()
|
||||||
policy_delivery = target_policy_delivery.get_another_policy(
|
policy_delivery = target_policy_delivery.get_another_policy(
|
||||||
supported_delivery_types[0])
|
supported_delivery_types[0])
|
||||||
elif isinstance(obj, dict):
|
elif isinstance(obj, dict):
|
||||||
|
@ -156,6 +158,11 @@ class PolicyDelivery(object):
|
||||||
return PolicyDelivery(delivery_type, self.key, None)
|
return PolicyDelivery(delivery_type, self.key, None)
|
||||||
else:
|
else:
|
||||||
return PolicyDelivery(delivery_type, self.key, 'opt-in')
|
return PolicyDelivery(delivery_type, self.key, 'opt-in')
|
||||||
|
elif self.key == 'contentSecurityPolicy':
|
||||||
|
if self.value is not None:
|
||||||
|
return PolicyDelivery(delivery_type, self.key, None)
|
||||||
|
else:
|
||||||
|
return PolicyDelivery(delivery_type, self.key, 'worker-src-none')
|
||||||
elif self.key == 'upgradeInsecureRequests':
|
elif self.key == 'upgradeInsecureRequests':
|
||||||
if self.value == 'upgrade':
|
if self.value == 'upgrade':
|
||||||
return PolicyDelivery(delivery_type, self.key, None)
|
return PolicyDelivery(delivery_type, self.key, None)
|
||||||
|
|
|
@ -0,0 +1,82 @@
|
||||||
|
<!DOCTYPE html>
|
||||||
|
<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec content-security-policy/` -->
|
||||||
|
<html>
|
||||||
|
<head>
|
||||||
|
<meta charset="utf-8">
|
||||||
|
<meta name="timeout" content="long">
|
||||||
|
<script src="/resources/testharness.js"></script>
|
||||||
|
<script src="/resources/testharnessreport.js"></script>
|
||||||
|
<script src="/common/security-features/resources/common.sub.js"></script>
|
||||||
|
<script src="../../../generic/test-case.sub.js"></script>
|
||||||
|
</head>
|
||||||
|
<body>
|
||||||
|
<script>
|
||||||
|
TestCase(
|
||||||
|
[
|
||||||
|
{
|
||||||
|
"expectation": "allowed",
|
||||||
|
"origin": "same-http",
|
||||||
|
"redirection": "keep-origin",
|
||||||
|
"source_context_list": [],
|
||||||
|
"source_scheme": "http",
|
||||||
|
"subresource": "script-tag",
|
||||||
|
"subresource_policy_deliveries": [],
|
||||||
|
"test_description": "Content Security Policy: Expects allowed for script-tag to same-http origin and keep-origin redirection from http context."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"expectation": "allowed",
|
||||||
|
"origin": "same-http",
|
||||||
|
"redirection": "no-redirect",
|
||||||
|
"source_context_list": [],
|
||||||
|
"source_scheme": "http",
|
||||||
|
"subresource": "script-tag",
|
||||||
|
"subresource_policy_deliveries": [],
|
||||||
|
"test_description": "Content Security Policy: Expects allowed for script-tag to same-http origin and no-redirect redirection from http context."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"expectation": "blocked",
|
||||||
|
"origin": "cross-http",
|
||||||
|
"redirection": "keep-origin",
|
||||||
|
"source_context_list": [],
|
||||||
|
"source_scheme": "http",
|
||||||
|
"subresource": "script-tag",
|
||||||
|
"subresource_policy_deliveries": [],
|
||||||
|
"test_description": "Content Security Policy: Expects blocked for script-tag to cross-http origin and keep-origin redirection from http context."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"expectation": "blocked",
|
||||||
|
"origin": "cross-http",
|
||||||
|
"redirection": "no-redirect",
|
||||||
|
"source_context_list": [],
|
||||||
|
"source_scheme": "http",
|
||||||
|
"subresource": "script-tag",
|
||||||
|
"subresource_policy_deliveries": [],
|
||||||
|
"test_description": "Content Security Policy: Expects blocked for script-tag to cross-http origin and no-redirect redirection from http context."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"expectation": "blocked",
|
||||||
|
"origin": "cross-http",
|
||||||
|
"redirection": "swap-origin",
|
||||||
|
"source_context_list": [],
|
||||||
|
"source_scheme": "http",
|
||||||
|
"subresource": "script-tag",
|
||||||
|
"subresource_policy_deliveries": [],
|
||||||
|
"test_description": "Content Security Policy: Expects blocked for script-tag to cross-http origin and swap-origin redirection from http context."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"expectation": "blocked",
|
||||||
|
"origin": "same-http",
|
||||||
|
"redirection": "swap-origin",
|
||||||
|
"source_context_list": [],
|
||||||
|
"source_scheme": "http",
|
||||||
|
"subresource": "script-tag",
|
||||||
|
"subresource_policy_deliveries": [],
|
||||||
|
"test_description": "Content Security Policy: Expects blocked for script-tag to same-http origin and swap-origin redirection from http context."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
new SanityChecker()
|
||||||
|
).start();
|
||||||
|
</script>
|
||||||
|
<div id="log"></div>
|
||||||
|
</body>
|
||||||
|
</html>
|
|
@ -0,0 +1 @@
|
||||||
|
Content-Security-Policy: script-src 'self' 'unsafe-inline'
|
|
@ -0,0 +1,82 @@
|
||||||
|
<!DOCTYPE html>
|
||||||
|
<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec content-security-policy/` -->
|
||||||
|
<html>
|
||||||
|
<head>
|
||||||
|
<meta charset="utf-8">
|
||||||
|
<meta name="timeout" content="long">
|
||||||
|
<script src="/resources/testharness.js"></script>
|
||||||
|
<script src="/resources/testharnessreport.js"></script>
|
||||||
|
<script src="/common/security-features/resources/common.sub.js"></script>
|
||||||
|
<script src="../../../generic/test-case.sub.js"></script>
|
||||||
|
</head>
|
||||||
|
<body>
|
||||||
|
<script>
|
||||||
|
TestCase(
|
||||||
|
[
|
||||||
|
{
|
||||||
|
"expectation": "allowed",
|
||||||
|
"origin": "same-https",
|
||||||
|
"redirection": "keep-origin",
|
||||||
|
"source_context_list": [],
|
||||||
|
"source_scheme": "https",
|
||||||
|
"subresource": "script-tag",
|
||||||
|
"subresource_policy_deliveries": [],
|
||||||
|
"test_description": "Content Security Policy: Expects allowed for script-tag to same-https origin and keep-origin redirection from https context."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"expectation": "allowed",
|
||||||
|
"origin": "same-https",
|
||||||
|
"redirection": "no-redirect",
|
||||||
|
"source_context_list": [],
|
||||||
|
"source_scheme": "https",
|
||||||
|
"subresource": "script-tag",
|
||||||
|
"subresource_policy_deliveries": [],
|
||||||
|
"test_description": "Content Security Policy: Expects allowed for script-tag to same-https origin and no-redirect redirection from https context."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"expectation": "blocked",
|
||||||
|
"origin": "cross-https",
|
||||||
|
"redirection": "keep-origin",
|
||||||
|
"source_context_list": [],
|
||||||
|
"source_scheme": "https",
|
||||||
|
"subresource": "script-tag",
|
||||||
|
"subresource_policy_deliveries": [],
|
||||||
|
"test_description": "Content Security Policy: Expects blocked for script-tag to cross-https origin and keep-origin redirection from https context."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"expectation": "blocked",
|
||||||
|
"origin": "cross-https",
|
||||||
|
"redirection": "no-redirect",
|
||||||
|
"source_context_list": [],
|
||||||
|
"source_scheme": "https",
|
||||||
|
"subresource": "script-tag",
|
||||||
|
"subresource_policy_deliveries": [],
|
||||||
|
"test_description": "Content Security Policy: Expects blocked for script-tag to cross-https origin and no-redirect redirection from https context."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"expectation": "blocked",
|
||||||
|
"origin": "cross-https",
|
||||||
|
"redirection": "swap-origin",
|
||||||
|
"source_context_list": [],
|
||||||
|
"source_scheme": "https",
|
||||||
|
"subresource": "script-tag",
|
||||||
|
"subresource_policy_deliveries": [],
|
||||||
|
"test_description": "Content Security Policy: Expects blocked for script-tag to cross-https origin and swap-origin redirection from https context."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"expectation": "blocked",
|
||||||
|
"origin": "same-https",
|
||||||
|
"redirection": "swap-origin",
|
||||||
|
"source_context_list": [],
|
||||||
|
"source_scheme": "https",
|
||||||
|
"subresource": "script-tag",
|
||||||
|
"subresource_policy_deliveries": [],
|
||||||
|
"test_description": "Content Security Policy: Expects blocked for script-tag to same-https origin and swap-origin redirection from https context."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
new SanityChecker()
|
||||||
|
).start();
|
||||||
|
</script>
|
||||||
|
<div id="log"></div>
|
||||||
|
</body>
|
||||||
|
</html>
|
|
@ -0,0 +1 @@
|
||||||
|
Content-Security-Policy: script-src 'self' 'unsafe-inline'
|
|
@ -0,0 +1,42 @@
|
||||||
|
<!DOCTYPE html>
|
||||||
|
<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec content-security-policy/` -->
|
||||||
|
<html>
|
||||||
|
<head>
|
||||||
|
<meta charset="utf-8">
|
||||||
|
<meta name="timeout" content="long">
|
||||||
|
<script src="/resources/testharness.js"></script>
|
||||||
|
<script src="/resources/testharnessreport.js"></script>
|
||||||
|
<script src="/common/security-features/resources/common.sub.js"></script>
|
||||||
|
<script src="../../../generic/test-case.sub.js"></script>
|
||||||
|
</head>
|
||||||
|
<body>
|
||||||
|
<script>
|
||||||
|
TestCase(
|
||||||
|
[
|
||||||
|
{
|
||||||
|
"expectation": "allowed",
|
||||||
|
"origin": "same-http",
|
||||||
|
"redirection": "keep-origin",
|
||||||
|
"source_context_list": [],
|
||||||
|
"source_scheme": "http",
|
||||||
|
"subresource": "sharedworker-classic",
|
||||||
|
"subresource_policy_deliveries": [],
|
||||||
|
"test_description": "Content Security Policy: Expects allowed for sharedworker-classic to same-http origin and keep-origin redirection from http context."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"expectation": "allowed",
|
||||||
|
"origin": "same-http",
|
||||||
|
"redirection": "no-redirect",
|
||||||
|
"source_context_list": [],
|
||||||
|
"source_scheme": "http",
|
||||||
|
"subresource": "sharedworker-classic",
|
||||||
|
"subresource_policy_deliveries": [],
|
||||||
|
"test_description": "Content Security Policy: Expects allowed for sharedworker-classic to same-http origin and no-redirect redirection from http context."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
new SanityChecker()
|
||||||
|
).start();
|
||||||
|
</script>
|
||||||
|
<div id="log"></div>
|
||||||
|
</body>
|
||||||
|
</html>
|
|
@ -0,0 +1 @@
|
||||||
|
Content-Security-Policy: script-src 'self' 'unsafe-inline'
|
|
@ -0,0 +1,42 @@
|
||||||
|
<!DOCTYPE html>
|
||||||
|
<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec content-security-policy/` -->
|
||||||
|
<html>
|
||||||
|
<head>
|
||||||
|
<meta charset="utf-8">
|
||||||
|
<meta name="timeout" content="long">
|
||||||
|
<script src="/resources/testharness.js"></script>
|
||||||
|
<script src="/resources/testharnessreport.js"></script>
|
||||||
|
<script src="/common/security-features/resources/common.sub.js"></script>
|
||||||
|
<script src="../../../generic/test-case.sub.js"></script>
|
||||||
|
</head>
|
||||||
|
<body>
|
||||||
|
<script>
|
||||||
|
TestCase(
|
||||||
|
[
|
||||||
|
{
|
||||||
|
"expectation": "allowed",
|
||||||
|
"origin": "same-https",
|
||||||
|
"redirection": "keep-origin",
|
||||||
|
"source_context_list": [],
|
||||||
|
"source_scheme": "https",
|
||||||
|
"subresource": "sharedworker-classic",
|
||||||
|
"subresource_policy_deliveries": [],
|
||||||
|
"test_description": "Content Security Policy: Expects allowed for sharedworker-classic to same-https origin and keep-origin redirection from https context."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"expectation": "allowed",
|
||||||
|
"origin": "same-https",
|
||||||
|
"redirection": "no-redirect",
|
||||||
|
"source_context_list": [],
|
||||||
|
"source_scheme": "https",
|
||||||
|
"subresource": "sharedworker-classic",
|
||||||
|
"subresource_policy_deliveries": [],
|
||||||
|
"test_description": "Content Security Policy: Expects allowed for sharedworker-classic to same-https origin and no-redirect redirection from https context."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
new SanityChecker()
|
||||||
|
).start();
|
||||||
|
</script>
|
||||||
|
<div id="log"></div>
|
||||||
|
</body>
|
||||||
|
</html>
|
|
@ -0,0 +1 @@
|
||||||
|
Content-Security-Policy: script-src 'self' 'unsafe-inline'
|
|
@ -0,0 +1,82 @@
|
||||||
|
<!DOCTYPE html>
|
||||||
|
<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec content-security-policy/` -->
|
||||||
|
<html>
|
||||||
|
<head>
|
||||||
|
<meta charset="utf-8">
|
||||||
|
<meta name="timeout" content="long">
|
||||||
|
<script src="/resources/testharness.js"></script>
|
||||||
|
<script src="/resources/testharnessreport.js"></script>
|
||||||
|
<script src="/common/security-features/resources/common.sub.js"></script>
|
||||||
|
<script src="../../../generic/test-case.sub.js"></script>
|
||||||
|
</head>
|
||||||
|
<body>
|
||||||
|
<script>
|
||||||
|
TestCase(
|
||||||
|
[
|
||||||
|
{
|
||||||
|
"expectation": "blocked",
|
||||||
|
"origin": "cross-http",
|
||||||
|
"redirection": "keep-origin",
|
||||||
|
"source_context_list": [],
|
||||||
|
"source_scheme": "http",
|
||||||
|
"subresource": "sharedworker-import-data",
|
||||||
|
"subresource_policy_deliveries": [],
|
||||||
|
"test_description": "Content Security Policy: Expects blocked for sharedworker-import-data to cross-http origin and keep-origin redirection from http context."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"expectation": "blocked",
|
||||||
|
"origin": "cross-http",
|
||||||
|
"redirection": "no-redirect",
|
||||||
|
"source_context_list": [],
|
||||||
|
"source_scheme": "http",
|
||||||
|
"subresource": "sharedworker-import-data",
|
||||||
|
"subresource_policy_deliveries": [],
|
||||||
|
"test_description": "Content Security Policy: Expects blocked for sharedworker-import-data to cross-http origin and no-redirect redirection from http context."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"expectation": "blocked",
|
||||||
|
"origin": "cross-http",
|
||||||
|
"redirection": "swap-origin",
|
||||||
|
"source_context_list": [],
|
||||||
|
"source_scheme": "http",
|
||||||
|
"subresource": "sharedworker-import-data",
|
||||||
|
"subresource_policy_deliveries": [],
|
||||||
|
"test_description": "Content Security Policy: Expects blocked for sharedworker-import-data to cross-http origin and swap-origin redirection from http context."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"expectation": "blocked",
|
||||||
|
"origin": "same-http",
|
||||||
|
"redirection": "keep-origin",
|
||||||
|
"source_context_list": [],
|
||||||
|
"source_scheme": "http",
|
||||||
|
"subresource": "sharedworker-import-data",
|
||||||
|
"subresource_policy_deliveries": [],
|
||||||
|
"test_description": "Content Security Policy: Expects blocked for sharedworker-import-data to same-http origin and keep-origin redirection from http context."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"expectation": "blocked",
|
||||||
|
"origin": "same-http",
|
||||||
|
"redirection": "no-redirect",
|
||||||
|
"source_context_list": [],
|
||||||
|
"source_scheme": "http",
|
||||||
|
"subresource": "sharedworker-import-data",
|
||||||
|
"subresource_policy_deliveries": [],
|
||||||
|
"test_description": "Content Security Policy: Expects blocked for sharedworker-import-data to same-http origin and no-redirect redirection from http context."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"expectation": "blocked",
|
||||||
|
"origin": "same-http",
|
||||||
|
"redirection": "swap-origin",
|
||||||
|
"source_context_list": [],
|
||||||
|
"source_scheme": "http",
|
||||||
|
"subresource": "sharedworker-import-data",
|
||||||
|
"subresource_policy_deliveries": [],
|
||||||
|
"test_description": "Content Security Policy: Expects blocked for sharedworker-import-data to same-http origin and swap-origin redirection from http context."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
new SanityChecker()
|
||||||
|
).start();
|
||||||
|
</script>
|
||||||
|
<div id="log"></div>
|
||||||
|
</body>
|
||||||
|
</html>
|
|
@ -0,0 +1 @@
|
||||||
|
Content-Security-Policy: script-src 'self' 'unsafe-inline'
|
|
@ -0,0 +1,82 @@
|
||||||
|
<!DOCTYPE html>
|
||||||
|
<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec content-security-policy/` -->
|
||||||
|
<html>
|
||||||
|
<head>
|
||||||
|
<meta charset="utf-8">
|
||||||
|
<meta name="timeout" content="long">
|
||||||
|
<script src="/resources/testharness.js"></script>
|
||||||
|
<script src="/resources/testharnessreport.js"></script>
|
||||||
|
<script src="/common/security-features/resources/common.sub.js"></script>
|
||||||
|
<script src="../../../generic/test-case.sub.js"></script>
|
||||||
|
</head>
|
||||||
|
<body>
|
||||||
|
<script>
|
||||||
|
TestCase(
|
||||||
|
[
|
||||||
|
{
|
||||||
|
"expectation": "blocked",
|
||||||
|
"origin": "cross-https",
|
||||||
|
"redirection": "keep-origin",
|
||||||
|
"source_context_list": [],
|
||||||
|
"source_scheme": "https",
|
||||||
|
"subresource": "sharedworker-import-data",
|
||||||
|
"subresource_policy_deliveries": [],
|
||||||
|
"test_description": "Content Security Policy: Expects blocked for sharedworker-import-data to cross-https origin and keep-origin redirection from https context."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"expectation": "blocked",
|
||||||
|
"origin": "cross-https",
|
||||||
|
"redirection": "no-redirect",
|
||||||
|
"source_context_list": [],
|
||||||
|
"source_scheme": "https",
|
||||||
|
"subresource": "sharedworker-import-data",
|
||||||
|
"subresource_policy_deliveries": [],
|
||||||
|
"test_description": "Content Security Policy: Expects blocked for sharedworker-import-data to cross-https origin and no-redirect redirection from https context."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"expectation": "blocked",
|
||||||
|
"origin": "cross-https",
|
||||||
|
"redirection": "swap-origin",
|
||||||
|
"source_context_list": [],
|
||||||
|
"source_scheme": "https",
|
||||||
|
"subresource": "sharedworker-import-data",
|
||||||
|
"subresource_policy_deliveries": [],
|
||||||
|
"test_description": "Content Security Policy: Expects blocked for sharedworker-import-data to cross-https origin and swap-origin redirection from https context."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"expectation": "blocked",
|
||||||
|
"origin": "same-https",
|
||||||
|
"redirection": "keep-origin",
|
||||||
|
"source_context_list": [],
|
||||||
|
"source_scheme": "https",
|
||||||
|
"subresource": "sharedworker-import-data",
|
||||||
|
"subresource_policy_deliveries": [],
|
||||||
|
"test_description": "Content Security Policy: Expects blocked for sharedworker-import-data to same-https origin and keep-origin redirection from https context."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"expectation": "blocked",
|
||||||
|
"origin": "same-https",
|
||||||
|
"redirection": "no-redirect",
|
||||||
|
"source_context_list": [],
|
||||||
|
"source_scheme": "https",
|
||||||
|
"subresource": "sharedworker-import-data",
|
||||||
|
"subresource_policy_deliveries": [],
|
||||||
|
"test_description": "Content Security Policy: Expects blocked for sharedworker-import-data to same-https origin and no-redirect redirection from https context."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"expectation": "blocked",
|
||||||
|
"origin": "same-https",
|
||||||
|
"redirection": "swap-origin",
|
||||||
|
"source_context_list": [],
|
||||||
|
"source_scheme": "https",
|
||||||
|
"subresource": "sharedworker-import-data",
|
||||||
|
"subresource_policy_deliveries": [],
|
||||||
|
"test_description": "Content Security Policy: Expects blocked for sharedworker-import-data to same-https origin and swap-origin redirection from https context."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
new SanityChecker()
|
||||||
|
).start();
|
||||||
|
</script>
|
||||||
|
<div id="log"></div>
|
||||||
|
</body>
|
||||||
|
</html>
|
|
@ -0,0 +1 @@
|
||||||
|
Content-Security-Policy: script-src 'self' 'unsafe-inline'
|
|
@ -0,0 +1,82 @@
|
||||||
|
<!DOCTYPE html>
|
||||||
|
<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec content-security-policy/` -->
|
||||||
|
<html>
|
||||||
|
<head>
|
||||||
|
<meta charset="utf-8">
|
||||||
|
<meta name="timeout" content="long">
|
||||||
|
<script src="/resources/testharness.js"></script>
|
||||||
|
<script src="/resources/testharnessreport.js"></script>
|
||||||
|
<script src="/common/security-features/resources/common.sub.js"></script>
|
||||||
|
<script src="../../../generic/test-case.sub.js"></script>
|
||||||
|
</head>
|
||||||
|
<body>
|
||||||
|
<script>
|
||||||
|
TestCase(
|
||||||
|
[
|
||||||
|
{
|
||||||
|
"expectation": "allowed",
|
||||||
|
"origin": "same-http",
|
||||||
|
"redirection": "keep-origin",
|
||||||
|
"source_context_list": [],
|
||||||
|
"source_scheme": "http",
|
||||||
|
"subresource": "sharedworker-import",
|
||||||
|
"subresource_policy_deliveries": [],
|
||||||
|
"test_description": "Content Security Policy: Expects allowed for sharedworker-import to same-http origin and keep-origin redirection from http context."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"expectation": "allowed",
|
||||||
|
"origin": "same-http",
|
||||||
|
"redirection": "no-redirect",
|
||||||
|
"source_context_list": [],
|
||||||
|
"source_scheme": "http",
|
||||||
|
"subresource": "sharedworker-import",
|
||||||
|
"subresource_policy_deliveries": [],
|
||||||
|
"test_description": "Content Security Policy: Expects allowed for sharedworker-import to same-http origin and no-redirect redirection from http context."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"expectation": "blocked",
|
||||||
|
"origin": "cross-http",
|
||||||
|
"redirection": "keep-origin",
|
||||||
|
"source_context_list": [],
|
||||||
|
"source_scheme": "http",
|
||||||
|
"subresource": "sharedworker-import",
|
||||||
|
"subresource_policy_deliveries": [],
|
||||||
|
"test_description": "Content Security Policy: Expects blocked for sharedworker-import to cross-http origin and keep-origin redirection from http context."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"expectation": "blocked",
|
||||||
|
"origin": "cross-http",
|
||||||
|
"redirection": "no-redirect",
|
||||||
|
"source_context_list": [],
|
||||||
|
"source_scheme": "http",
|
||||||
|
"subresource": "sharedworker-import",
|
||||||
|
"subresource_policy_deliveries": [],
|
||||||
|
"test_description": "Content Security Policy: Expects blocked for sharedworker-import to cross-http origin and no-redirect redirection from http context."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"expectation": "blocked",
|
||||||
|
"origin": "cross-http",
|
||||||
|
"redirection": "swap-origin",
|
||||||
|
"source_context_list": [],
|
||||||
|
"source_scheme": "http",
|
||||||
|
"subresource": "sharedworker-import",
|
||||||
|
"subresource_policy_deliveries": [],
|
||||||
|
"test_description": "Content Security Policy: Expects blocked for sharedworker-import to cross-http origin and swap-origin redirection from http context."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"expectation": "blocked",
|
||||||
|
"origin": "same-http",
|
||||||
|
"redirection": "swap-origin",
|
||||||
|
"source_context_list": [],
|
||||||
|
"source_scheme": "http",
|
||||||
|
"subresource": "sharedworker-import",
|
||||||
|
"subresource_policy_deliveries": [],
|
||||||
|
"test_description": "Content Security Policy: Expects blocked for sharedworker-import to same-http origin and swap-origin redirection from http context."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
new SanityChecker()
|
||||||
|
).start();
|
||||||
|
</script>
|
||||||
|
<div id="log"></div>
|
||||||
|
</body>
|
||||||
|
</html>
|
|
@ -0,0 +1 @@
|
||||||
|
Content-Security-Policy: script-src 'self' 'unsafe-inline'
|
|
@ -0,0 +1,82 @@
|
||||||
|
<!DOCTYPE html>
|
||||||
|
<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec content-security-policy/` -->
|
||||||
|
<html>
|
||||||
|
<head>
|
||||||
|
<meta charset="utf-8">
|
||||||
|
<meta name="timeout" content="long">
|
||||||
|
<script src="/resources/testharness.js"></script>
|
||||||
|
<script src="/resources/testharnessreport.js"></script>
|
||||||
|
<script src="/common/security-features/resources/common.sub.js"></script>
|
||||||
|
<script src="../../../generic/test-case.sub.js"></script>
|
||||||
|
</head>
|
||||||
|
<body>
|
||||||
|
<script>
|
||||||
|
TestCase(
|
||||||
|
[
|
||||||
|
{
|
||||||
|
"expectation": "allowed",
|
||||||
|
"origin": "same-https",
|
||||||
|
"redirection": "keep-origin",
|
||||||
|
"source_context_list": [],
|
||||||
|
"source_scheme": "https",
|
||||||
|
"subresource": "sharedworker-import",
|
||||||
|
"subresource_policy_deliveries": [],
|
||||||
|
"test_description": "Content Security Policy: Expects allowed for sharedworker-import to same-https origin and keep-origin redirection from https context."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"expectation": "allowed",
|
||||||
|
"origin": "same-https",
|
||||||
|
"redirection": "no-redirect",
|
||||||
|
"source_context_list": [],
|
||||||
|
"source_scheme": "https",
|
||||||
|
"subresource": "sharedworker-import",
|
||||||
|
"subresource_policy_deliveries": [],
|
||||||
|
"test_description": "Content Security Policy: Expects allowed for sharedworker-import to same-https origin and no-redirect redirection from https context."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"expectation": "blocked",
|
||||||
|
"origin": "cross-https",
|
||||||
|
"redirection": "keep-origin",
|
||||||
|
"source_context_list": [],
|
||||||
|
"source_scheme": "https",
|
||||||
|
"subresource": "sharedworker-import",
|
||||||
|
"subresource_policy_deliveries": [],
|
||||||
|
"test_description": "Content Security Policy: Expects blocked for sharedworker-import to cross-https origin and keep-origin redirection from https context."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"expectation": "blocked",
|
||||||
|
"origin": "cross-https",
|
||||||
|
"redirection": "no-redirect",
|
||||||
|
"source_context_list": [],
|
||||||
|
"source_scheme": "https",
|
||||||
|
"subresource": "sharedworker-import",
|
||||||
|
"subresource_policy_deliveries": [],
|
||||||
|
"test_description": "Content Security Policy: Expects blocked for sharedworker-import to cross-https origin and no-redirect redirection from https context."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"expectation": "blocked",
|
||||||
|
"origin": "cross-https",
|
||||||
|
"redirection": "swap-origin",
|
||||||
|
"source_context_list": [],
|
||||||
|
"source_scheme": "https",
|
||||||
|
"subresource": "sharedworker-import",
|
||||||
|
"subresource_policy_deliveries": [],
|
||||||
|
"test_description": "Content Security Policy: Expects blocked for sharedworker-import to cross-https origin and swap-origin redirection from https context."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"expectation": "blocked",
|
||||||
|
"origin": "same-https",
|
||||||
|
"redirection": "swap-origin",
|
||||||
|
"source_context_list": [],
|
||||||
|
"source_scheme": "https",
|
||||||
|
"subresource": "sharedworker-import",
|
||||||
|
"subresource_policy_deliveries": [],
|
||||||
|
"test_description": "Content Security Policy: Expects blocked for sharedworker-import to same-https origin and swap-origin redirection from https context."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
new SanityChecker()
|
||||||
|
).start();
|
||||||
|
</script>
|
||||||
|
<div id="log"></div>
|
||||||
|
</body>
|
||||||
|
</html>
|
|
@ -0,0 +1 @@
|
||||||
|
Content-Security-Policy: script-src 'self' 'unsafe-inline'
|
|
@ -0,0 +1,42 @@
|
||||||
|
<!DOCTYPE html>
|
||||||
|
<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec content-security-policy/` -->
|
||||||
|
<html>
|
||||||
|
<head>
|
||||||
|
<meta charset="utf-8">
|
||||||
|
<meta name="timeout" content="long">
|
||||||
|
<script src="/resources/testharness.js"></script>
|
||||||
|
<script src="/resources/testharnessreport.js"></script>
|
||||||
|
<script src="/common/security-features/resources/common.sub.js"></script>
|
||||||
|
<script src="../../../generic/test-case.sub.js"></script>
|
||||||
|
</head>
|
||||||
|
<body>
|
||||||
|
<script>
|
||||||
|
TestCase(
|
||||||
|
[
|
||||||
|
{
|
||||||
|
"expectation": "allowed",
|
||||||
|
"origin": "same-http",
|
||||||
|
"redirection": "keep-origin",
|
||||||
|
"source_context_list": [],
|
||||||
|
"source_scheme": "http",
|
||||||
|
"subresource": "sharedworker-module",
|
||||||
|
"subresource_policy_deliveries": [],
|
||||||
|
"test_description": "Content Security Policy: Expects allowed for sharedworker-module to same-http origin and keep-origin redirection from http context."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"expectation": "allowed",
|
||||||
|
"origin": "same-http",
|
||||||
|
"redirection": "no-redirect",
|
||||||
|
"source_context_list": [],
|
||||||
|
"source_scheme": "http",
|
||||||
|
"subresource": "sharedworker-module",
|
||||||
|
"subresource_policy_deliveries": [],
|
||||||
|
"test_description": "Content Security Policy: Expects allowed for sharedworker-module to same-http origin and no-redirect redirection from http context."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
new SanityChecker()
|
||||||
|
).start();
|
||||||
|
</script>
|
||||||
|
<div id="log"></div>
|
||||||
|
</body>
|
||||||
|
</html>
|
|
@ -0,0 +1 @@
|
||||||
|
Content-Security-Policy: script-src 'self' 'unsafe-inline'
|
|
@ -0,0 +1,42 @@
|
||||||
|
<!DOCTYPE html>
|
||||||
|
<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec content-security-policy/` -->
|
||||||
|
<html>
|
||||||
|
<head>
|
||||||
|
<meta charset="utf-8">
|
||||||
|
<meta name="timeout" content="long">
|
||||||
|
<script src="/resources/testharness.js"></script>
|
||||||
|
<script src="/resources/testharnessreport.js"></script>
|
||||||
|
<script src="/common/security-features/resources/common.sub.js"></script>
|
||||||
|
<script src="../../../generic/test-case.sub.js"></script>
|
||||||
|
</head>
|
||||||
|
<body>
|
||||||
|
<script>
|
||||||
|
TestCase(
|
||||||
|
[
|
||||||
|
{
|
||||||
|
"expectation": "allowed",
|
||||||
|
"origin": "same-https",
|
||||||
|
"redirection": "keep-origin",
|
||||||
|
"source_context_list": [],
|
||||||
|
"source_scheme": "https",
|
||||||
|
"subresource": "sharedworker-module",
|
||||||
|
"subresource_policy_deliveries": [],
|
||||||
|
"test_description": "Content Security Policy: Expects allowed for sharedworker-module to same-https origin and keep-origin redirection from https context."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"expectation": "allowed",
|
||||||
|
"origin": "same-https",
|
||||||
|
"redirection": "no-redirect",
|
||||||
|
"source_context_list": [],
|
||||||
|
"source_scheme": "https",
|
||||||
|
"subresource": "sharedworker-module",
|
||||||
|
"subresource_policy_deliveries": [],
|
||||||
|
"test_description": "Content Security Policy: Expects allowed for sharedworker-module to same-https origin and no-redirect redirection from https context."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
new SanityChecker()
|
||||||
|
).start();
|
||||||
|
</script>
|
||||||
|
<div id="log"></div>
|
||||||
|
</body>
|
||||||
|
</html>
|
|
@ -0,0 +1 @@
|
||||||
|
Content-Security-Policy: script-src 'self' 'unsafe-inline'
|
|
@ -0,0 +1,42 @@
|
||||||
|
<!DOCTYPE html>
|
||||||
|
<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec content-security-policy/` -->
|
||||||
|
<html>
|
||||||
|
<head>
|
||||||
|
<meta charset="utf-8">
|
||||||
|
<meta name="timeout" content="long">
|
||||||
|
<script src="/resources/testharness.js"></script>
|
||||||
|
<script src="/resources/testharnessreport.js"></script>
|
||||||
|
<script src="/common/security-features/resources/common.sub.js"></script>
|
||||||
|
<script src="../../../generic/test-case.sub.js"></script>
|
||||||
|
</head>
|
||||||
|
<body>
|
||||||
|
<script>
|
||||||
|
TestCase(
|
||||||
|
[
|
||||||
|
{
|
||||||
|
"expectation": "allowed",
|
||||||
|
"origin": "same-http",
|
||||||
|
"redirection": "keep-origin",
|
||||||
|
"source_context_list": [],
|
||||||
|
"source_scheme": "http",
|
||||||
|
"subresource": "worker-classic",
|
||||||
|
"subresource_policy_deliveries": [],
|
||||||
|
"test_description": "Content Security Policy: Expects allowed for worker-classic to same-http origin and keep-origin redirection from http context."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"expectation": "allowed",
|
||||||
|
"origin": "same-http",
|
||||||
|
"redirection": "no-redirect",
|
||||||
|
"source_context_list": [],
|
||||||
|
"source_scheme": "http",
|
||||||
|
"subresource": "worker-classic",
|
||||||
|
"subresource_policy_deliveries": [],
|
||||||
|
"test_description": "Content Security Policy: Expects allowed for worker-classic to same-http origin and no-redirect redirection from http context."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
new SanityChecker()
|
||||||
|
).start();
|
||||||
|
</script>
|
||||||
|
<div id="log"></div>
|
||||||
|
</body>
|
||||||
|
</html>
|
|
@ -0,0 +1 @@
|
||||||
|
Content-Security-Policy: script-src 'self' 'unsafe-inline'
|
|
@ -0,0 +1,42 @@
|
||||||
|
<!DOCTYPE html>
|
||||||
|
<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec content-security-policy/` -->
|
||||||
|
<html>
|
||||||
|
<head>
|
||||||
|
<meta charset="utf-8">
|
||||||
|
<meta name="timeout" content="long">
|
||||||
|
<script src="/resources/testharness.js"></script>
|
||||||
|
<script src="/resources/testharnessreport.js"></script>
|
||||||
|
<script src="/common/security-features/resources/common.sub.js"></script>
|
||||||
|
<script src="../../../generic/test-case.sub.js"></script>
|
||||||
|
</head>
|
||||||
|
<body>
|
||||||
|
<script>
|
||||||
|
TestCase(
|
||||||
|
[
|
||||||
|
{
|
||||||
|
"expectation": "allowed",
|
||||||
|
"origin": "same-https",
|
||||||
|
"redirection": "keep-origin",
|
||||||
|
"source_context_list": [],
|
||||||
|
"source_scheme": "https",
|
||||||
|
"subresource": "worker-classic",
|
||||||
|
"subresource_policy_deliveries": [],
|
||||||
|
"test_description": "Content Security Policy: Expects allowed for worker-classic to same-https origin and keep-origin redirection from https context."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"expectation": "allowed",
|
||||||
|
"origin": "same-https",
|
||||||
|
"redirection": "no-redirect",
|
||||||
|
"source_context_list": [],
|
||||||
|
"source_scheme": "https",
|
||||||
|
"subresource": "worker-classic",
|
||||||
|
"subresource_policy_deliveries": [],
|
||||||
|
"test_description": "Content Security Policy: Expects allowed for worker-classic to same-https origin and no-redirect redirection from https context."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
new SanityChecker()
|
||||||
|
).start();
|
||||||
|
</script>
|
||||||
|
<div id="log"></div>
|
||||||
|
</body>
|
||||||
|
</html>
|
|
@ -0,0 +1 @@
|
||||||
|
Content-Security-Policy: script-src 'self' 'unsafe-inline'
|
|
@ -0,0 +1,82 @@
|
||||||
|
<!DOCTYPE html>
|
||||||
|
<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec content-security-policy/` -->
|
||||||
|
<html>
|
||||||
|
<head>
|
||||||
|
<meta charset="utf-8">
|
||||||
|
<meta name="timeout" content="long">
|
||||||
|
<script src="/resources/testharness.js"></script>
|
||||||
|
<script src="/resources/testharnessreport.js"></script>
|
||||||
|
<script src="/common/security-features/resources/common.sub.js"></script>
|
||||||
|
<script src="../../../generic/test-case.sub.js"></script>
|
||||||
|
</head>
|
||||||
|
<body>
|
||||||
|
<script>
|
||||||
|
TestCase(
|
||||||
|
[
|
||||||
|
{
|
||||||
|
"expectation": "blocked",
|
||||||
|
"origin": "cross-http",
|
||||||
|
"redirection": "keep-origin",
|
||||||
|
"source_context_list": [],
|
||||||
|
"source_scheme": "http",
|
||||||
|
"subresource": "worker-import-data",
|
||||||
|
"subresource_policy_deliveries": [],
|
||||||
|
"test_description": "Content Security Policy: Expects blocked for worker-import-data to cross-http origin and keep-origin redirection from http context."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"expectation": "blocked",
|
||||||
|
"origin": "cross-http",
|
||||||
|
"redirection": "no-redirect",
|
||||||
|
"source_context_list": [],
|
||||||
|
"source_scheme": "http",
|
||||||
|
"subresource": "worker-import-data",
|
||||||
|
"subresource_policy_deliveries": [],
|
||||||
|
"test_description": "Content Security Policy: Expects blocked for worker-import-data to cross-http origin and no-redirect redirection from http context."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"expectation": "blocked",
|
||||||
|
"origin": "cross-http",
|
||||||
|
"redirection": "swap-origin",
|
||||||
|
"source_context_list": [],
|
||||||
|
"source_scheme": "http",
|
||||||
|
"subresource": "worker-import-data",
|
||||||
|
"subresource_policy_deliveries": [],
|
||||||
|
"test_description": "Content Security Policy: Expects blocked for worker-import-data to cross-http origin and swap-origin redirection from http context."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"expectation": "blocked",
|
||||||
|
"origin": "same-http",
|
||||||
|
"redirection": "keep-origin",
|
||||||
|
"source_context_list": [],
|
||||||
|
"source_scheme": "http",
|
||||||
|
"subresource": "worker-import-data",
|
||||||
|
"subresource_policy_deliveries": [],
|
||||||
|
"test_description": "Content Security Policy: Expects blocked for worker-import-data to same-http origin and keep-origin redirection from http context."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"expectation": "blocked",
|
||||||
|
"origin": "same-http",
|
||||||
|
"redirection": "no-redirect",
|
||||||
|
"source_context_list": [],
|
||||||
|
"source_scheme": "http",
|
||||||
|
"subresource": "worker-import-data",
|
||||||
|
"subresource_policy_deliveries": [],
|
||||||
|
"test_description": "Content Security Policy: Expects blocked for worker-import-data to same-http origin and no-redirect redirection from http context."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"expectation": "blocked",
|
||||||
|
"origin": "same-http",
|
||||||
|
"redirection": "swap-origin",
|
||||||
|
"source_context_list": [],
|
||||||
|
"source_scheme": "http",
|
||||||
|
"subresource": "worker-import-data",
|
||||||
|
"subresource_policy_deliveries": [],
|
||||||
|
"test_description": "Content Security Policy: Expects blocked for worker-import-data to same-http origin and swap-origin redirection from http context."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
new SanityChecker()
|
||||||
|
).start();
|
||||||
|
</script>
|
||||||
|
<div id="log"></div>
|
||||||
|
</body>
|
||||||
|
</html>
|
|
@ -0,0 +1 @@
|
||||||
|
Content-Security-Policy: script-src 'self' 'unsafe-inline'
|
|
@ -0,0 +1,82 @@
|
||||||
|
<!DOCTYPE html>
|
||||||
|
<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec content-security-policy/` -->
|
||||||
|
<html>
|
||||||
|
<head>
|
||||||
|
<meta charset="utf-8">
|
||||||
|
<meta name="timeout" content="long">
|
||||||
|
<script src="/resources/testharness.js"></script>
|
||||||
|
<script src="/resources/testharnessreport.js"></script>
|
||||||
|
<script src="/common/security-features/resources/common.sub.js"></script>
|
||||||
|
<script src="../../../generic/test-case.sub.js"></script>
|
||||||
|
</head>
|
||||||
|
<body>
|
||||||
|
<script>
|
||||||
|
TestCase(
|
||||||
|
[
|
||||||
|
{
|
||||||
|
"expectation": "blocked",
|
||||||
|
"origin": "cross-https",
|
||||||
|
"redirection": "keep-origin",
|
||||||
|
"source_context_list": [],
|
||||||
|
"source_scheme": "https",
|
||||||
|
"subresource": "worker-import-data",
|
||||||
|
"subresource_policy_deliveries": [],
|
||||||
|
"test_description": "Content Security Policy: Expects blocked for worker-import-data to cross-https origin and keep-origin redirection from https context."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"expectation": "blocked",
|
||||||
|
"origin": "cross-https",
|
||||||
|
"redirection": "no-redirect",
|
||||||
|
"source_context_list": [],
|
||||||
|
"source_scheme": "https",
|
||||||
|
"subresource": "worker-import-data",
|
||||||
|
"subresource_policy_deliveries": [],
|
||||||
|
"test_description": "Content Security Policy: Expects blocked for worker-import-data to cross-https origin and no-redirect redirection from https context."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"expectation": "blocked",
|
||||||
|
"origin": "cross-https",
|
||||||
|
"redirection": "swap-origin",
|
||||||
|
"source_context_list": [],
|
||||||
|
"source_scheme": "https",
|
||||||
|
"subresource": "worker-import-data",
|
||||||
|
"subresource_policy_deliveries": [],
|
||||||
|
"test_description": "Content Security Policy: Expects blocked for worker-import-data to cross-https origin and swap-origin redirection from https context."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"expectation": "blocked",
|
||||||
|
"origin": "same-https",
|
||||||
|
"redirection": "keep-origin",
|
||||||
|
"source_context_list": [],
|
||||||
|
"source_scheme": "https",
|
||||||
|
"subresource": "worker-import-data",
|
||||||
|
"subresource_policy_deliveries": [],
|
||||||
|
"test_description": "Content Security Policy: Expects blocked for worker-import-data to same-https origin and keep-origin redirection from https context."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"expectation": "blocked",
|
||||||
|
"origin": "same-https",
|
||||||
|
"redirection": "no-redirect",
|
||||||
|
"source_context_list": [],
|
||||||
|
"source_scheme": "https",
|
||||||
|
"subresource": "worker-import-data",
|
||||||
|
"subresource_policy_deliveries": [],
|
||||||
|
"test_description": "Content Security Policy: Expects blocked for worker-import-data to same-https origin and no-redirect redirection from https context."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"expectation": "blocked",
|
||||||
|
"origin": "same-https",
|
||||||
|
"redirection": "swap-origin",
|
||||||
|
"source_context_list": [],
|
||||||
|
"source_scheme": "https",
|
||||||
|
"subresource": "worker-import-data",
|
||||||
|
"subresource_policy_deliveries": [],
|
||||||
|
"test_description": "Content Security Policy: Expects blocked for worker-import-data to same-https origin and swap-origin redirection from https context."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
new SanityChecker()
|
||||||
|
).start();
|
||||||
|
</script>
|
||||||
|
<div id="log"></div>
|
||||||
|
</body>
|
||||||
|
</html>
|
|
@ -0,0 +1 @@
|
||||||
|
Content-Security-Policy: script-src 'self' 'unsafe-inline'
|
|
@ -0,0 +1,82 @@
|
||||||
|
<!DOCTYPE html>
|
||||||
|
<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec content-security-policy/` -->
|
||||||
|
<html>
|
||||||
|
<head>
|
||||||
|
<meta charset="utf-8">
|
||||||
|
<meta name="timeout" content="long">
|
||||||
|
<script src="/resources/testharness.js"></script>
|
||||||
|
<script src="/resources/testharnessreport.js"></script>
|
||||||
|
<script src="/common/security-features/resources/common.sub.js"></script>
|
||||||
|
<script src="../../../generic/test-case.sub.js"></script>
|
||||||
|
</head>
|
||||||
|
<body>
|
||||||
|
<script>
|
||||||
|
TestCase(
|
||||||
|
[
|
||||||
|
{
|
||||||
|
"expectation": "allowed",
|
||||||
|
"origin": "same-http",
|
||||||
|
"redirection": "keep-origin",
|
||||||
|
"source_context_list": [],
|
||||||
|
"source_scheme": "http",
|
||||||
|
"subresource": "worker-import",
|
||||||
|
"subresource_policy_deliveries": [],
|
||||||
|
"test_description": "Content Security Policy: Expects allowed for worker-import to same-http origin and keep-origin redirection from http context."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"expectation": "allowed",
|
||||||
|
"origin": "same-http",
|
||||||
|
"redirection": "no-redirect",
|
||||||
|
"source_context_list": [],
|
||||||
|
"source_scheme": "http",
|
||||||
|
"subresource": "worker-import",
|
||||||
|
"subresource_policy_deliveries": [],
|
||||||
|
"test_description": "Content Security Policy: Expects allowed for worker-import to same-http origin and no-redirect redirection from http context."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"expectation": "blocked",
|
||||||
|
"origin": "cross-http",
|
||||||
|
"redirection": "keep-origin",
|
||||||
|
"source_context_list": [],
|
||||||
|
"source_scheme": "http",
|
||||||
|
"subresource": "worker-import",
|
||||||
|
"subresource_policy_deliveries": [],
|
||||||
|
"test_description": "Content Security Policy: Expects blocked for worker-import to cross-http origin and keep-origin redirection from http context."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"expectation": "blocked",
|
||||||
|
"origin": "cross-http",
|
||||||
|
"redirection": "no-redirect",
|
||||||
|
"source_context_list": [],
|
||||||
|
"source_scheme": "http",
|
||||||
|
"subresource": "worker-import",
|
||||||
|
"subresource_policy_deliveries": [],
|
||||||
|
"test_description": "Content Security Policy: Expects blocked for worker-import to cross-http origin and no-redirect redirection from http context."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"expectation": "blocked",
|
||||||
|
"origin": "cross-http",
|
||||||
|
"redirection": "swap-origin",
|
||||||
|
"source_context_list": [],
|
||||||
|
"source_scheme": "http",
|
||||||
|
"subresource": "worker-import",
|
||||||
|
"subresource_policy_deliveries": [],
|
||||||
|
"test_description": "Content Security Policy: Expects blocked for worker-import to cross-http origin and swap-origin redirection from http context."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"expectation": "blocked",
|
||||||
|
"origin": "same-http",
|
||||||
|
"redirection": "swap-origin",
|
||||||
|
"source_context_list": [],
|
||||||
|
"source_scheme": "http",
|
||||||
|
"subresource": "worker-import",
|
||||||
|
"subresource_policy_deliveries": [],
|
||||||
|
"test_description": "Content Security Policy: Expects blocked for worker-import to same-http origin and swap-origin redirection from http context."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
new SanityChecker()
|
||||||
|
).start();
|
||||||
|
</script>
|
||||||
|
<div id="log"></div>
|
||||||
|
</body>
|
||||||
|
</html>
|
|
@ -0,0 +1 @@
|
||||||
|
Content-Security-Policy: script-src 'self' 'unsafe-inline'
|
|
@ -0,0 +1,82 @@
|
||||||
|
<!DOCTYPE html>
|
||||||
|
<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec content-security-policy/` -->
|
||||||
|
<html>
|
||||||
|
<head>
|
||||||
|
<meta charset="utf-8">
|
||||||
|
<meta name="timeout" content="long">
|
||||||
|
<script src="/resources/testharness.js"></script>
|
||||||
|
<script src="/resources/testharnessreport.js"></script>
|
||||||
|
<script src="/common/security-features/resources/common.sub.js"></script>
|
||||||
|
<script src="../../../generic/test-case.sub.js"></script>
|
||||||
|
</head>
|
||||||
|
<body>
|
||||||
|
<script>
|
||||||
|
TestCase(
|
||||||
|
[
|
||||||
|
{
|
||||||
|
"expectation": "allowed",
|
||||||
|
"origin": "same-https",
|
||||||
|
"redirection": "keep-origin",
|
||||||
|
"source_context_list": [],
|
||||||
|
"source_scheme": "https",
|
||||||
|
"subresource": "worker-import",
|
||||||
|
"subresource_policy_deliveries": [],
|
||||||
|
"test_description": "Content Security Policy: Expects allowed for worker-import to same-https origin and keep-origin redirection from https context."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"expectation": "allowed",
|
||||||
|
"origin": "same-https",
|
||||||
|
"redirection": "no-redirect",
|
||||||
|
"source_context_list": [],
|
||||||
|
"source_scheme": "https",
|
||||||
|
"subresource": "worker-import",
|
||||||
|
"subresource_policy_deliveries": [],
|
||||||
|
"test_description": "Content Security Policy: Expects allowed for worker-import to same-https origin and no-redirect redirection from https context."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"expectation": "blocked",
|
||||||
|
"origin": "cross-https",
|
||||||
|
"redirection": "keep-origin",
|
||||||
|
"source_context_list": [],
|
||||||
|
"source_scheme": "https",
|
||||||
|
"subresource": "worker-import",
|
||||||
|
"subresource_policy_deliveries": [],
|
||||||
|
"test_description": "Content Security Policy: Expects blocked for worker-import to cross-https origin and keep-origin redirection from https context."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"expectation": "blocked",
|
||||||
|
"origin": "cross-https",
|
||||||
|
"redirection": "no-redirect",
|
||||||
|
"source_context_list": [],
|
||||||
|
"source_scheme": "https",
|
||||||
|
"subresource": "worker-import",
|
||||||
|
"subresource_policy_deliveries": [],
|
||||||
|
"test_description": "Content Security Policy: Expects blocked for worker-import to cross-https origin and no-redirect redirection from https context."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"expectation": "blocked",
|
||||||
|
"origin": "cross-https",
|
||||||
|
"redirection": "swap-origin",
|
||||||
|
"source_context_list": [],
|
||||||
|
"source_scheme": "https",
|
||||||
|
"subresource": "worker-import",
|
||||||
|
"subresource_policy_deliveries": [],
|
||||||
|
"test_description": "Content Security Policy: Expects blocked for worker-import to cross-https origin and swap-origin redirection from https context."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"expectation": "blocked",
|
||||||
|
"origin": "same-https",
|
||||||
|
"redirection": "swap-origin",
|
||||||
|
"source_context_list": [],
|
||||||
|
"source_scheme": "https",
|
||||||
|
"subresource": "worker-import",
|
||||||
|
"subresource_policy_deliveries": [],
|
||||||
|
"test_description": "Content Security Policy: Expects blocked for worker-import to same-https origin and swap-origin redirection from https context."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
new SanityChecker()
|
||||||
|
).start();
|
||||||
|
</script>
|
||||||
|
<div id="log"></div>
|
||||||
|
</body>
|
||||||
|
</html>
|
|
@ -0,0 +1 @@
|
||||||
|
Content-Security-Policy: script-src 'self' 'unsafe-inline'
|
Some files were not shown because too many files have changed in this diff Show more
Loading…
Add table
Add a link
Reference in a new issue