Update web-platform-tests to revision b'fef1c092193085ce2fa64fd116484ba0f3c0dbb1'

This commit is contained in:
WPT Sync Bot 2021-02-26 08:19:22 +00:00
parent 45f5d84d1b
commit 6b8f08a140
543 changed files with 24225 additions and 722 deletions

View file

@ -1,4 +0,0 @@
[hit-test-floats-002.html]
[Hit test float]
expected: FAIL

View file

@ -2,9 +2,6 @@
[Test @font-face matching for weight 99]
expected: FAIL
[Test @font-face matching for weight 420]
expected: FAIL
[Test @font-face matching for weight 600]
expected: FAIL

View file

@ -315,12 +315,12 @@
[<iframe>: combined response Content-Type: text/html;" \\" text/plain]
expected: FAIL
[<iframe>: separate response Content-Type: text/html */*;charset=gbk]
expected: FAIL
[<iframe>: combined response Content-Type: text/html */*;charset=gbk]
expected: FAIL
[<iframe>: combined response Content-Type: text/html;" text/plain]
expected: FAIL
[<iframe>: combined response Content-Type: text/html;charset=gbk text/plain text/html]
expected: FAIL
[<iframe>: separate response Content-Type: text/html;" text/plain]
expected: FAIL

View file

@ -53,12 +53,3 @@
[combined text/javascript ]
expected: FAIL
[separate text/javascript x/x]
expected: FAIL
[separate text/javascript; charset=windows-1252 text/javascript]
expected: FAIL
[separate text/javascript;charset=windows-1252 text/javascript]
expected: FAIL

View file

@ -1,4 +0,0 @@
[traverse_the_history_1.html]
[Multiple history traversals from the same task]
expected: FAIL

View file

@ -0,0 +1,4 @@
[traverse_the_history_5.html]
[Multiple history traversals, last would be aborted]
expected: FAIL

View file

@ -1,2 +0,0 @@
[cross-origin-objects-on-new-window.html]
expected: TIMEOUT

View file

@ -1,5 +1,5 @@
[parent-yes-1-no-same-2-no-subdomain.sub.https.html]
expected: TIMEOUT
expected: CRASH
[after parent: originAgentCluster must equal true]
expected: NOTRUN

View file

@ -1,4 +0,0 @@
[creating_browsing_context_test_01.html]
[first argument: absolute url]
expected: FAIL

View file

@ -1,5 +1,5 @@
[embedded-opener-remove-frame.html]
expected: TIMEOUT
expected: CRASH
[opener of discarded nested browsing context]
expected: FAIL

View file

@ -3459,3 +3459,15 @@
[HTMLMediaElement interface: document.createElement("video") must inherit property "preservesPitch" with the proper type]
expected: FAIL
[HTMLSourceElement interface: attribute width]
expected: FAIL
[HTMLSourceElement interface: attribute height]
expected: FAIL
[HTMLSourceElement interface: document.createElement("source") must inherit property "width" with the proper type]
expected: FAIL
[HTMLSourceElement interface: document.createElement("source") must inherit property "height" with the proper type]
expected: FAIL

View file

@ -4,14 +4,14 @@
expected: FAIL
[Host element with delegatesFocus including no focusable descendants should be skipped]
expected: FAIL
expected: NOTRUN
[Element with tabindex should support autofocus]
expected: FAIL
[Area element should support autofocus]
expected: TIMEOUT
expected: NOTRUN
[Host element with delegatesFocus should support autofocus]
expected: FAIL
expected: TIMEOUT

View file

@ -0,0 +1,2 @@
[table-column-width.html]
expected: CRASH

View file

@ -2,3 +2,36 @@
[Computed style]
expected: FAIL
[source width and height attributes are used to infer aspect-ratio in <picture>]
expected: FAIL
[Computed style for width/height/aspect-ratio]
expected: FAIL
[Source width/height should take precedence over img attributes.]
expected: FAIL
[Make sure style gets invalidated correctly when the source gets removed.]
expected: FAIL
[If the <source> has only one of width/height, we don't get an aspect ratio, even if the <img> has both.]
expected: FAIL
[If we don't have width/height on the source, we fall back to width/height on the <img>.]
expected: FAIL
[If we only have one width/height attribute, we should get that attribute mapped but no aspect ratio, even if <img> has attributes.]
expected: FAIL
[Dynamically changing width/height should change computed style]
expected: FAIL
[Changing which <source> matches should change computed style]
expected: FAIL
[Percentages on source should be ignored for aspect-ratio but used for width/height.]
expected: FAIL
[Trailing garbage should be ignored but not make the attribute invalid]
expected: FAIL

View file

@ -1,5 +1,5 @@
[iframe_sandbox_popups_escaping-2.html]
expected: TIMEOUT
expected: CRASH
[Check that popups from a sandboxed iframe escape the sandbox if\n allow-popups-to-escape-sandbox is used]
expected: TIMEOUT

View file

@ -1,4 +1,5 @@
[iframe_sandbox_popups_escaping-3.html]
expected: TIMEOUT
[Check that popups from a sandboxed iframe escape the sandbox if\n allow-popups-to-escape-sandbox is used]
expected: FAIL
expected: TIMEOUT

View file

@ -1,5 +1,5 @@
[iframe_sandbox_popups_nonescaping-1.html]
expected: TIMEOUT
expected: CRASH
[Check that popups from a sandboxed iframe do not escape the sandbox]
expected: NOTRUN

View file

@ -1,4 +1,5 @@
[iframe_sandbox_popups_nonescaping-3.html]
expected: CRASH
[Check that popups from a sandboxed iframe do not escape the sandbox]
expected: FAIL

View file

@ -1,4 +0,0 @@
[form-double-submit-2.html]
[preventDefault should allow onclick submit() to succeed]
expected: FAIL

View file

@ -2,57 +2,75 @@
[input type text: selectionStart a second time (must not fire select)]
expected: FAIL
[textarea: selectionDirection a second time (must not fire select)]
expected: FAIL
[input type url: setRangeText() a second time (must not fire select)]
expected: FAIL
[input type search: setRangeText() a second time (must not fire select)]
expected: FAIL
[input type search: setSelectionRange out of range a second time (must not fire select)]
expected: FAIL
[textarea: setSelectionRange() a second time (must not fire select)]
expected: FAIL
[input type text: selectionEnd a second time (must not fire select)]
expected: FAIL
[input type search: selectionEnd a second time (must not fire select)]
expected: FAIL
[input type tel: setSelectionRange() a second time (must not fire select)]
expected: FAIL
[input type tel: selectionEnd out of range a second time (must not fire select)]
expected: FAIL
[input type password: selectionDirection a second time (must not fire select)]
expected: FAIL
[textarea: selectionStart out of range a second time (must not fire select)]
expected: FAIL
[textarea: selectionEnd out of range a second time (must not fire select)]
expected: FAIL
[textarea: setSelectionRange out of range a second time (must not fire select)]
expected: FAIL
[input type text: selectionEnd out of range a second time (must not fire select)]
expected: FAIL
[input type text: setSelectionRange out of range a second time (must not fire select)]
expected: FAIL
[input type url: selectionStart out of range a second time (must not fire select)]
expected: FAIL
[input type url: setSelectionRange out of range a second time (must not fire select)]
expected: FAIL
[input type password: selectionEnd out of range a second time (must not fire select)]
expected: FAIL
[textarea: selectionEnd a second time (must not fire select)]
expected: FAIL
[textarea: setRangeText() a second time (must not fire select)]
expected: FAIL
[input type text: setSelectionRange() a second time (must not fire select)]
expected: FAIL
[input type text: setRangeText() a second time (must not fire select)]
expected: FAIL
[input type text: selectionStart out of range a second time (must not fire select)]
expected: FAIL
[input type search: selectionDirection a second time (must not fire select)]
expected: FAIL
[input type search: selectionEnd out of range a second time (must not fire select)]
expected: FAIL
[input type tel: selectionDirection a second time (must not fire select)]
expected: FAIL
[input type tel: selectionStart out of range a second time (must not fire select)]
expected: FAIL
[input type url: select() a second time (must not fire select)]
expected: FAIL
[input type url: selectionStart a second time (must not fire select)]
expected: FAIL
[input type url: setSelectionRange() a second time (must not fire select)]
expected: FAIL
[input type url: selectionEnd out of range a second time (must not fire select)]
expected: FAIL
[input type password: selectionEnd a second time (must not fire select)]
expected: FAIL
[input type password: setRangeText() a second time (must not fire select)]
expected: FAIL
[input type password: setSelectionRange out of range a second time (must not fire select)]
expected: FAIL

View file

@ -1,13 +1,14 @@
[htmlanchorelement_noopener.html]
expected: TIMEOUT
[Check that targeting of rel=noopener with a given name reuses an existing window with that name]
expected: FAIL
[Check that rel=noopener with target=_top does a normal load]
expected: FAIL
expected: NOTRUN
[Check that rel=noopener with target=_parent does a normal load]
expected: FAIL
expected: NOTRUN
[Check that rel=noopener with target=_self does a normal load]
expected: FAIL
expected: NOTRUN

View file

@ -0,0 +1,2 @@
[dynamic-import-with-assertion-argument.html]
expected: ERROR

View file

@ -1,4 +0,0 @@
[DOMContentLoaded-defer.html]
[The end: DOMContentLoaded and defer scripts]
expected: FAIL

View file

@ -0,0 +1,4 @@
[module-delayed.html]
[async document.write in a module]
expected: FAIL

View file

@ -1,5 +1,4 @@
[realtimeanalyser-fft-scaling.html]
expected: TIMEOUT
[X 2048-point FFT peak position is not equal to 64. Got 0.]
expected: FAIL

View file

@ -1,4 +1,5 @@
[audiocontext-not-fully-active.html]
expected: TIMEOUT
[frame in navigated remote-site frame]
expected: FAIL

View file

@ -11,3 +11,9 @@
[test_bidi_session_3[capabilities0-True\]]
expected: ERROR
[test_bidi_session_send]
expected: ERROR
[test_bidi_session_with_different_capability[capabilities0\]]
expected: ERROR

View file

@ -2,9 +2,3 @@
[test_element_in_object]
expected: FAIL
[test_array_in_object]
expected: FAIL
[test_object_in_array]
expected: FAIL

View file

@ -0,0 +1,5 @@
[017.html]
expected: TIMEOUT
[origin of the script that invoked the method, about:blank]
expected: TIMEOUT

View file

@ -1,5 +0,0 @@
[018.html]
expected: TIMEOUT
[origin of the script that invoked the method, javascript:]
expected: TIMEOUT

View file

@ -1,5 +1,4 @@
[import-in-moduleworker.html]
expected: ERROR
[Base URL in module dedicated workers: import]
expected: FAIL

View file

@ -1,4 +1,5 @@
[sharedworker-in-worker.html]
expected: ERROR
[Base URL in workers: new SharedWorker()]
expected: FAIL

File diff suppressed because it is too large Load diff

View file

@ -1,4 +0,0 @@
[hit-test-floats-002.html]
[Hit test float]
expected: FAIL

View file

@ -17,9 +17,6 @@
[Test @font-face matching for weight 399]
expected: FAIL
[Test @font-face matching for weight 420]
expected: FAIL
[Test @font-face matching for weight 400]
expected: FAIL

View file

@ -315,12 +315,12 @@
[<iframe>: combined response Content-Type: text/html;" \\" text/plain]
expected: FAIL
[<iframe>: separate response Content-Type: text/html */*;charset=gbk]
expected: FAIL
[<iframe>: combined response Content-Type: text/html */*;charset=gbk]
expected: FAIL
[<iframe>: combined response Content-Type: text/html;" text/plain]
expected: FAIL
[<iframe>: combined response Content-Type: text/html;charset=gbk text/plain text/html]
expected: FAIL
[<iframe>: separate response Content-Type: text/html;" text/plain]
expected: FAIL

View file

@ -53,12 +53,3 @@
[combined text/javascript ]
expected: FAIL
[separate text/javascript x/x]
expected: FAIL
[separate text/javascript; charset=windows-1252 text/javascript]
expected: FAIL
[separate text/javascript;charset=windows-1252 text/javascript]
expected: FAIL

View file

@ -1,4 +0,0 @@
[traverse_the_history_1.html]
[Multiple history traversals from the same task]
expected: FAIL

View file

@ -0,0 +1,4 @@
[traverse_the_history_5.html]
[Multiple history traversals, last would be aborted]
expected: FAIL

View file

@ -1,2 +0,0 @@
[cross-origin-objects-on-new-window.html]
expected: TIMEOUT

View file

@ -1,4 +1,5 @@
[parent-yes-1-no-same-2-no-subdomain.sub.https.html]
expected: CRASH
[after parent: originAgentCluster must equal true]
expected: FAIL

View file

@ -1,4 +0,0 @@
[creating_browsing_context_test_01.html]
[first argument: absolute url]
expected: FAIL

View file

@ -1,5 +1,5 @@
[embedded-opener-remove-frame.html]
expected: TIMEOUT
expected: CRASH
[opener and "removed" embedded documents]
expected: FAIL

View file

@ -3771,3 +3771,15 @@
[HTMLMediaElement interface: document.createElement("video") must inherit property "preservesPitch" with the proper type]
expected: FAIL
[HTMLSourceElement interface: attribute width]
expected: FAIL
[HTMLSourceElement interface: attribute height]
expected: FAIL
[HTMLSourceElement interface: document.createElement("source") must inherit property "width" with the proper type]
expected: FAIL
[HTMLSourceElement interface: document.createElement("source") must inherit property "height" with the proper type]
expected: FAIL

View file

@ -7,11 +7,11 @@
expected: FAIL
[Host element with delegatesFocus including no focusable descendants should be skipped]
expected: FAIL
expected: NOTRUN
[Area element should support autofocus]
expected: TIMEOUT
expected: NOTRUN
[Host element with delegatesFocus should support autofocus]
expected: FAIL
expected: TIMEOUT

View file

@ -1,2 +1,2 @@
[table-column-width.html]
expected: TIMEOUT
expected: CRASH

View file

@ -2,3 +2,36 @@
[Computed style]
expected: FAIL
[source width and height attributes are used to infer aspect-ratio in <picture>]
expected: FAIL
[Computed style for width/height/aspect-ratio]
expected: FAIL
[Source width/height should take precedence over img attributes.]
expected: FAIL
[Make sure style gets invalidated correctly when the source gets removed.]
expected: FAIL
[If the <source> has only one of width/height, we don't get an aspect ratio, even if the <img> has both.]
expected: FAIL
[If we don't have width/height on the source, we fall back to width/height on the <img>.]
expected: FAIL
[If we only have one width/height attribute, we should get that attribute mapped but no aspect ratio, even if <img> has attributes.]
expected: FAIL
[Dynamically changing width/height should change computed style]
expected: FAIL
[Changing which <source> matches should change computed style]
expected: FAIL
[Percentages on source should be ignored for aspect-ratio but used for width/height.]
expected: FAIL
[Trailing garbage should be ignored but not make the attribute invalid]
expected: FAIL

View file

@ -1,5 +1,5 @@
[iframe_sandbox_popups_escaping-2.html]
expected: TIMEOUT
expected: CRASH
[Check that popups from a sandboxed iframe escape the sandbox if\n allow-popups-to-escape-sandbox is used]
expected: TIMEOUT

View file

@ -1,5 +1,6 @@
[iframe_sandbox_popups_escaping-3.html]
type: testharness
expected: TIMEOUT
[Check that popups from a sandboxed iframe escape the sandbox if\n allow-popups-to-escape-sandbox is used]
expected: FAIL
expected: TIMEOUT

View file

@ -1,6 +1,6 @@
[iframe_sandbox_popups_nonescaping-1.html]
type: testharness
expected: TIMEOUT
expected: CRASH
[Check that popups from a sandboxed iframe do not escape the sandbox]
expected: NOTRUN

View file

@ -1,4 +1,5 @@
[iframe_sandbox_popups_nonescaping-3.html]
expected: CRASH
[Check that popups from a sandboxed iframe do not escape the sandbox]
expected: FAIL

View file

@ -1,4 +0,0 @@
[form-double-submit-2.html]
[preventDefault should allow onclick submit() to succeed]
expected: FAIL

View file

@ -2,57 +2,75 @@
[input type text: selectionStart a second time (must not fire select)]
expected: FAIL
[textarea: selectionDirection a second time (must not fire select)]
expected: FAIL
[input type url: setRangeText() a second time (must not fire select)]
expected: FAIL
[input type search: setRangeText() a second time (must not fire select)]
expected: FAIL
[input type search: setSelectionRange out of range a second time (must not fire select)]
expected: FAIL
[textarea: setSelectionRange() a second time (must not fire select)]
expected: FAIL
[input type text: selectionEnd a second time (must not fire select)]
expected: FAIL
[input type search: selectionEnd a second time (must not fire select)]
expected: FAIL
[input type tel: setSelectionRange() a second time (must not fire select)]
expected: FAIL
[input type tel: selectionEnd out of range a second time (must not fire select)]
expected: FAIL
[input type password: selectionDirection a second time (must not fire select)]
expected: FAIL
[textarea: selectionStart out of range a second time (must not fire select)]
expected: FAIL
[textarea: selectionEnd out of range a second time (must not fire select)]
expected: FAIL
[textarea: setSelectionRange out of range a second time (must not fire select)]
expected: FAIL
[input type text: selectionEnd out of range a second time (must not fire select)]
expected: FAIL
[input type text: setSelectionRange out of range a second time (must not fire select)]
expected: FAIL
[input type url: selectionStart out of range a second time (must not fire select)]
expected: FAIL
[input type url: setSelectionRange out of range a second time (must not fire select)]
expected: FAIL
[input type password: selectionEnd out of range a second time (must not fire select)]
expected: FAIL
[textarea: selectionEnd a second time (must not fire select)]
expected: FAIL
[textarea: setRangeText() a second time (must not fire select)]
expected: FAIL
[input type text: setSelectionRange() a second time (must not fire select)]
expected: FAIL
[input type text: setRangeText() a second time (must not fire select)]
expected: FAIL
[input type text: selectionStart out of range a second time (must not fire select)]
expected: FAIL
[input type search: selectionDirection a second time (must not fire select)]
expected: FAIL
[input type search: selectionEnd out of range a second time (must not fire select)]
expected: FAIL
[input type tel: selectionDirection a second time (must not fire select)]
expected: FAIL
[input type tel: selectionStart out of range a second time (must not fire select)]
expected: FAIL
[input type url: select() a second time (must not fire select)]
expected: FAIL
[input type url: selectionStart a second time (must not fire select)]
expected: FAIL
[input type url: setSelectionRange() a second time (must not fire select)]
expected: FAIL
[input type url: selectionEnd out of range a second time (must not fire select)]
expected: FAIL
[input type password: selectionEnd a second time (must not fire select)]
expected: FAIL
[input type password: setRangeText() a second time (must not fire select)]
expected: FAIL
[input type password: setSelectionRange out of range a second time (must not fire select)]
expected: FAIL

View file

@ -1,5 +1,6 @@
[htmlanchorelement_noopener.html]
type: testharness
expected: TIMEOUT
[Check that targeting of rel=noopener with a given name ignores an existing window with that name]
expected: NOTRUN
@ -7,11 +8,11 @@
expected: FAIL
[Check that rel=noopener with target=_top does a normal load]
expected: FAIL
expected: NOTRUN
[Check that rel=noopener with target=_parent does a normal load]
expected: FAIL
expected: NOTRUN
[Check that rel=noopener with target=_self does a normal load]
expected: FAIL
expected: NOTRUN

View file

@ -0,0 +1,2 @@
[dynamic-import-with-assertion-argument.html]
expected: ERROR

View file

@ -1,4 +0,0 @@
[DOMContentLoaded-defer.html]
[The end: DOMContentLoaded and defer scripts]
expected: FAIL

View file

@ -0,0 +1,4 @@
[module-delayed.html]
[async document.write in a module]
expected: FAIL

View file

@ -1,5 +1,4 @@
[realtimeanalyser-fft-scaling.html]
expected: TIMEOUT
[X 2048-point FFT peak position is not equal to 64. Got 0.]
expected: FAIL

View file

@ -1,4 +1,5 @@
[audiocontext-not-fully-active.html]
expected: TIMEOUT
[frame in navigated remote-site frame]
expected: FAIL

View file

@ -11,3 +11,9 @@
[test_bidi_session_3[capabilities0-True\]]
expected: ERROR
[test_bidi_session_send]
expected: ERROR
[test_bidi_session_with_different_capability[capabilities0\]]
expected: ERROR

View file

@ -2,9 +2,3 @@
[test_element_in_object]
expected: FAIL
[test_array_in_object]
expected: FAIL
[test_object_in_array]
expected: FAIL

View file

@ -0,0 +1,5 @@
[017.html]
expected: TIMEOUT
[origin of the script that invoked the method, about:blank]
expected: TIMEOUT

View file

@ -1,5 +0,0 @@
[018.html]
expected: TIMEOUT
[origin of the script that invoked the method, javascript:]
expected: TIMEOUT

View file

@ -1,5 +1,4 @@
[import-in-moduleworker.html]
expected: ERROR
[Base URL in module dedicated workers: import]
expected: FAIL

View file

@ -1,4 +1,5 @@
[sharedworker-in-worker.html]
expected: ERROR
[Base URL in workers: new SharedWorker()]
expected: FAIL

View file

@ -76,6 +76,43 @@ def get_test_filename(spec_directory, spec_json, selection):
spec_json['test_file_path_pattern'] % selection_for_filename)
def get_csp_value(value):
'''
Returns actual CSP header values (e.g. "worker-src 'self'") for the
given string used in PolicyDelivery's value (e.g. "worker-src-self").
'''
# script-src
# Test-related scripts like testharness.js and inline scripts containing
# test bodies.
# 'unsafe-inline' is added as a workaround here. This is probably not so
# bad, as it shouldn't intefere non-inline-script requests that we want to
# test.
if value == 'script-src-wildcard':
return "script-src * 'unsafe-inline'"
if value == 'script-src-self':
return "script-src 'self' 'unsafe-inline'"
# Workaround for "script-src 'none'" would be more complicated, because
# - "script-src 'none' 'unsafe-inline'" is handled somehow differently from
# "script-src 'none'", i.e.
# https://w3c.github.io/webappsec-csp/#match-url-to-source-list Step 3
# handles the latter but not the former.
# - We need nonce- or path-based additional values to allow same-origin
# test scripts like testharness.js.
# Therefore, we disable 'script-src-none' tests for now in
# `/content-security-policy/spec.src.json`.
if value == 'script-src-none':
return "script-src 'none'"
# worker-src
if value == 'worker-src-wildcard':
return 'worker-src *'
if value == 'worker-src-self':
return "worker-src 'self'"
if value == 'worker-src-none':
return "worker-src 'none'"
raise Exception('Invalid delivery_value: %s' % value)
def handle_deliveries(policy_deliveries):
'''
Generate <meta> elements and HTTP headers for the given list of
@ -110,6 +147,16 @@ def handle_deliveries(policy_deliveries):
else:
raise Exception(
'Invalid delivery_type: %s' % delivery.delivery_type)
elif delivery.key == 'contentSecurityPolicy':
csp_value = get_csp_value(delivery.value)
if delivery.delivery_type == 'meta':
meta += '<meta http-equiv="Content-Security-Policy" ' + \
'content="' + csp_value + '">'
elif delivery.delivery_type == 'http-rp':
headers['Content-Security-Policy'] = csp_value
else:
raise Exception(
'Invalid delivery_type: %s' % delivery.delivery_type)
elif delivery.key == 'upgradeInsecureRequests':
# https://w3c.github.io/webappsec-upgrade-insecure-requests/#delivery
assert (delivery.value == 'upgrade')

View file

@ -94,16 +94,23 @@
"delivery_value": "*",
"redirection": "*",
"subresource": [
"area-tag",
"a-tag",
"area-tag",
"audio-tag",
"beacon",
"fetch",
"iframe-tag",
"img-tag",
"link-css-tag",
"link-prefetch-tag",
"object-tag",
"picture-tag",
"script-tag",
"sharedworker-classic",
"sharedworker-import",
"sharedworker-import-data",
"sharedworker-module",
"video-tag",
"worker-classic",
"worker-import",
"worker-import-data",
@ -127,6 +134,27 @@
"cross-ws-downgrade"
],
"expectation": "*"
},
{
// Worklets are HTTPS contexts only
"expansion": "*",
"source_scheme": "http",
"source_context_list": "*",
"delivery_type": "*",
"delivery_value": "*",
"redirection": "*",
"subresource": [
"worklet-animation",
"worklet-animation-import-data",
"worklet-audio",
"worklet-audio-import-data",
"worklet-layout",
"worklet-layout-import-data",
"worklet-paint",
"worklet-paint-import-data"
],
"origin": "*",
"expectation": "*"
}
],
"source_context_schema": {

View file

@ -122,6 +122,8 @@ class PolicyDelivery(object):
raise ShouldSkip()
policy_delivery = target_policy_delivery
elif obj == "anotherPolicy":
if len(supported_delivery_types) == 0:
raise ShouldSkip()
policy_delivery = target_policy_delivery.get_another_policy(
supported_delivery_types[0])
elif isinstance(obj, dict):
@ -156,6 +158,11 @@ class PolicyDelivery(object):
return PolicyDelivery(delivery_type, self.key, None)
else:
return PolicyDelivery(delivery_type, self.key, 'opt-in')
elif self.key == 'contentSecurityPolicy':
if self.value is not None:
return PolicyDelivery(delivery_type, self.key, None)
else:
return PolicyDelivery(delivery_type, self.key, 'worker-src-none')
elif self.key == 'upgradeInsecureRequests':
if self.value == 'upgrade':
return PolicyDelivery(delivery_type, self.key, None)

View file

@ -0,0 +1,82 @@
<!DOCTYPE html>
<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec content-security-policy/` -->
<html>
<head>
<meta charset="utf-8">
<meta name="timeout" content="long">
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
<script src="/common/security-features/resources/common.sub.js"></script>
<script src="../../../generic/test-case.sub.js"></script>
</head>
<body>
<script>
TestCase(
[
{
"expectation": "allowed",
"origin": "same-http",
"redirection": "keep-origin",
"source_context_list": [],
"source_scheme": "http",
"subresource": "script-tag",
"subresource_policy_deliveries": [],
"test_description": "Content Security Policy: Expects allowed for script-tag to same-http origin and keep-origin redirection from http context."
},
{
"expectation": "allowed",
"origin": "same-http",
"redirection": "no-redirect",
"source_context_list": [],
"source_scheme": "http",
"subresource": "script-tag",
"subresource_policy_deliveries": [],
"test_description": "Content Security Policy: Expects allowed for script-tag to same-http origin and no-redirect redirection from http context."
},
{
"expectation": "blocked",
"origin": "cross-http",
"redirection": "keep-origin",
"source_context_list": [],
"source_scheme": "http",
"subresource": "script-tag",
"subresource_policy_deliveries": [],
"test_description": "Content Security Policy: Expects blocked for script-tag to cross-http origin and keep-origin redirection from http context."
},
{
"expectation": "blocked",
"origin": "cross-http",
"redirection": "no-redirect",
"source_context_list": [],
"source_scheme": "http",
"subresource": "script-tag",
"subresource_policy_deliveries": [],
"test_description": "Content Security Policy: Expects blocked for script-tag to cross-http origin and no-redirect redirection from http context."
},
{
"expectation": "blocked",
"origin": "cross-http",
"redirection": "swap-origin",
"source_context_list": [],
"source_scheme": "http",
"subresource": "script-tag",
"subresource_policy_deliveries": [],
"test_description": "Content Security Policy: Expects blocked for script-tag to cross-http origin and swap-origin redirection from http context."
},
{
"expectation": "blocked",
"origin": "same-http",
"redirection": "swap-origin",
"source_context_list": [],
"source_scheme": "http",
"subresource": "script-tag",
"subresource_policy_deliveries": [],
"test_description": "Content Security Policy: Expects blocked for script-tag to same-http origin and swap-origin redirection from http context."
}
],
new SanityChecker()
).start();
</script>
<div id="log"></div>
</body>
</html>

View file

@ -0,0 +1 @@
Content-Security-Policy: script-src 'self' 'unsafe-inline'

View file

@ -0,0 +1,82 @@
<!DOCTYPE html>
<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec content-security-policy/` -->
<html>
<head>
<meta charset="utf-8">
<meta name="timeout" content="long">
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
<script src="/common/security-features/resources/common.sub.js"></script>
<script src="../../../generic/test-case.sub.js"></script>
</head>
<body>
<script>
TestCase(
[
{
"expectation": "allowed",
"origin": "same-https",
"redirection": "keep-origin",
"source_context_list": [],
"source_scheme": "https",
"subresource": "script-tag",
"subresource_policy_deliveries": [],
"test_description": "Content Security Policy: Expects allowed for script-tag to same-https origin and keep-origin redirection from https context."
},
{
"expectation": "allowed",
"origin": "same-https",
"redirection": "no-redirect",
"source_context_list": [],
"source_scheme": "https",
"subresource": "script-tag",
"subresource_policy_deliveries": [],
"test_description": "Content Security Policy: Expects allowed for script-tag to same-https origin and no-redirect redirection from https context."
},
{
"expectation": "blocked",
"origin": "cross-https",
"redirection": "keep-origin",
"source_context_list": [],
"source_scheme": "https",
"subresource": "script-tag",
"subresource_policy_deliveries": [],
"test_description": "Content Security Policy: Expects blocked for script-tag to cross-https origin and keep-origin redirection from https context."
},
{
"expectation": "blocked",
"origin": "cross-https",
"redirection": "no-redirect",
"source_context_list": [],
"source_scheme": "https",
"subresource": "script-tag",
"subresource_policy_deliveries": [],
"test_description": "Content Security Policy: Expects blocked for script-tag to cross-https origin and no-redirect redirection from https context."
},
{
"expectation": "blocked",
"origin": "cross-https",
"redirection": "swap-origin",
"source_context_list": [],
"source_scheme": "https",
"subresource": "script-tag",
"subresource_policy_deliveries": [],
"test_description": "Content Security Policy: Expects blocked for script-tag to cross-https origin and swap-origin redirection from https context."
},
{
"expectation": "blocked",
"origin": "same-https",
"redirection": "swap-origin",
"source_context_list": [],
"source_scheme": "https",
"subresource": "script-tag",
"subresource_policy_deliveries": [],
"test_description": "Content Security Policy: Expects blocked for script-tag to same-https origin and swap-origin redirection from https context."
}
],
new SanityChecker()
).start();
</script>
<div id="log"></div>
</body>
</html>

View file

@ -0,0 +1 @@
Content-Security-Policy: script-src 'self' 'unsafe-inline'

View file

@ -0,0 +1,42 @@
<!DOCTYPE html>
<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec content-security-policy/` -->
<html>
<head>
<meta charset="utf-8">
<meta name="timeout" content="long">
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
<script src="/common/security-features/resources/common.sub.js"></script>
<script src="../../../generic/test-case.sub.js"></script>
</head>
<body>
<script>
TestCase(
[
{
"expectation": "allowed",
"origin": "same-http",
"redirection": "keep-origin",
"source_context_list": [],
"source_scheme": "http",
"subresource": "sharedworker-classic",
"subresource_policy_deliveries": [],
"test_description": "Content Security Policy: Expects allowed for sharedworker-classic to same-http origin and keep-origin redirection from http context."
},
{
"expectation": "allowed",
"origin": "same-http",
"redirection": "no-redirect",
"source_context_list": [],
"source_scheme": "http",
"subresource": "sharedworker-classic",
"subresource_policy_deliveries": [],
"test_description": "Content Security Policy: Expects allowed for sharedworker-classic to same-http origin and no-redirect redirection from http context."
}
],
new SanityChecker()
).start();
</script>
<div id="log"></div>
</body>
</html>

View file

@ -0,0 +1 @@
Content-Security-Policy: script-src 'self' 'unsafe-inline'

View file

@ -0,0 +1,42 @@
<!DOCTYPE html>
<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec content-security-policy/` -->
<html>
<head>
<meta charset="utf-8">
<meta name="timeout" content="long">
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
<script src="/common/security-features/resources/common.sub.js"></script>
<script src="../../../generic/test-case.sub.js"></script>
</head>
<body>
<script>
TestCase(
[
{
"expectation": "allowed",
"origin": "same-https",
"redirection": "keep-origin",
"source_context_list": [],
"source_scheme": "https",
"subresource": "sharedworker-classic",
"subresource_policy_deliveries": [],
"test_description": "Content Security Policy: Expects allowed for sharedworker-classic to same-https origin and keep-origin redirection from https context."
},
{
"expectation": "allowed",
"origin": "same-https",
"redirection": "no-redirect",
"source_context_list": [],
"source_scheme": "https",
"subresource": "sharedworker-classic",
"subresource_policy_deliveries": [],
"test_description": "Content Security Policy: Expects allowed for sharedworker-classic to same-https origin and no-redirect redirection from https context."
}
],
new SanityChecker()
).start();
</script>
<div id="log"></div>
</body>
</html>

View file

@ -0,0 +1 @@
Content-Security-Policy: script-src 'self' 'unsafe-inline'

View file

@ -0,0 +1,82 @@
<!DOCTYPE html>
<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec content-security-policy/` -->
<html>
<head>
<meta charset="utf-8">
<meta name="timeout" content="long">
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
<script src="/common/security-features/resources/common.sub.js"></script>
<script src="../../../generic/test-case.sub.js"></script>
</head>
<body>
<script>
TestCase(
[
{
"expectation": "blocked",
"origin": "cross-http",
"redirection": "keep-origin",
"source_context_list": [],
"source_scheme": "http",
"subresource": "sharedworker-import-data",
"subresource_policy_deliveries": [],
"test_description": "Content Security Policy: Expects blocked for sharedworker-import-data to cross-http origin and keep-origin redirection from http context."
},
{
"expectation": "blocked",
"origin": "cross-http",
"redirection": "no-redirect",
"source_context_list": [],
"source_scheme": "http",
"subresource": "sharedworker-import-data",
"subresource_policy_deliveries": [],
"test_description": "Content Security Policy: Expects blocked for sharedworker-import-data to cross-http origin and no-redirect redirection from http context."
},
{
"expectation": "blocked",
"origin": "cross-http",
"redirection": "swap-origin",
"source_context_list": [],
"source_scheme": "http",
"subresource": "sharedworker-import-data",
"subresource_policy_deliveries": [],
"test_description": "Content Security Policy: Expects blocked for sharedworker-import-data to cross-http origin and swap-origin redirection from http context."
},
{
"expectation": "blocked",
"origin": "same-http",
"redirection": "keep-origin",
"source_context_list": [],
"source_scheme": "http",
"subresource": "sharedworker-import-data",
"subresource_policy_deliveries": [],
"test_description": "Content Security Policy: Expects blocked for sharedworker-import-data to same-http origin and keep-origin redirection from http context."
},
{
"expectation": "blocked",
"origin": "same-http",
"redirection": "no-redirect",
"source_context_list": [],
"source_scheme": "http",
"subresource": "sharedworker-import-data",
"subresource_policy_deliveries": [],
"test_description": "Content Security Policy: Expects blocked for sharedworker-import-data to same-http origin and no-redirect redirection from http context."
},
{
"expectation": "blocked",
"origin": "same-http",
"redirection": "swap-origin",
"source_context_list": [],
"source_scheme": "http",
"subresource": "sharedworker-import-data",
"subresource_policy_deliveries": [],
"test_description": "Content Security Policy: Expects blocked for sharedworker-import-data to same-http origin and swap-origin redirection from http context."
}
],
new SanityChecker()
).start();
</script>
<div id="log"></div>
</body>
</html>

View file

@ -0,0 +1 @@
Content-Security-Policy: script-src 'self' 'unsafe-inline'

View file

@ -0,0 +1,82 @@
<!DOCTYPE html>
<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec content-security-policy/` -->
<html>
<head>
<meta charset="utf-8">
<meta name="timeout" content="long">
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
<script src="/common/security-features/resources/common.sub.js"></script>
<script src="../../../generic/test-case.sub.js"></script>
</head>
<body>
<script>
TestCase(
[
{
"expectation": "blocked",
"origin": "cross-https",
"redirection": "keep-origin",
"source_context_list": [],
"source_scheme": "https",
"subresource": "sharedworker-import-data",
"subresource_policy_deliveries": [],
"test_description": "Content Security Policy: Expects blocked for sharedworker-import-data to cross-https origin and keep-origin redirection from https context."
},
{
"expectation": "blocked",
"origin": "cross-https",
"redirection": "no-redirect",
"source_context_list": [],
"source_scheme": "https",
"subresource": "sharedworker-import-data",
"subresource_policy_deliveries": [],
"test_description": "Content Security Policy: Expects blocked for sharedworker-import-data to cross-https origin and no-redirect redirection from https context."
},
{
"expectation": "blocked",
"origin": "cross-https",
"redirection": "swap-origin",
"source_context_list": [],
"source_scheme": "https",
"subresource": "sharedworker-import-data",
"subresource_policy_deliveries": [],
"test_description": "Content Security Policy: Expects blocked for sharedworker-import-data to cross-https origin and swap-origin redirection from https context."
},
{
"expectation": "blocked",
"origin": "same-https",
"redirection": "keep-origin",
"source_context_list": [],
"source_scheme": "https",
"subresource": "sharedworker-import-data",
"subresource_policy_deliveries": [],
"test_description": "Content Security Policy: Expects blocked for sharedworker-import-data to same-https origin and keep-origin redirection from https context."
},
{
"expectation": "blocked",
"origin": "same-https",
"redirection": "no-redirect",
"source_context_list": [],
"source_scheme": "https",
"subresource": "sharedworker-import-data",
"subresource_policy_deliveries": [],
"test_description": "Content Security Policy: Expects blocked for sharedworker-import-data to same-https origin and no-redirect redirection from https context."
},
{
"expectation": "blocked",
"origin": "same-https",
"redirection": "swap-origin",
"source_context_list": [],
"source_scheme": "https",
"subresource": "sharedworker-import-data",
"subresource_policy_deliveries": [],
"test_description": "Content Security Policy: Expects blocked for sharedworker-import-data to same-https origin and swap-origin redirection from https context."
}
],
new SanityChecker()
).start();
</script>
<div id="log"></div>
</body>
</html>

View file

@ -0,0 +1 @@
Content-Security-Policy: script-src 'self' 'unsafe-inline'

View file

@ -0,0 +1,82 @@
<!DOCTYPE html>
<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec content-security-policy/` -->
<html>
<head>
<meta charset="utf-8">
<meta name="timeout" content="long">
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
<script src="/common/security-features/resources/common.sub.js"></script>
<script src="../../../generic/test-case.sub.js"></script>
</head>
<body>
<script>
TestCase(
[
{
"expectation": "allowed",
"origin": "same-http",
"redirection": "keep-origin",
"source_context_list": [],
"source_scheme": "http",
"subresource": "sharedworker-import",
"subresource_policy_deliveries": [],
"test_description": "Content Security Policy: Expects allowed for sharedworker-import to same-http origin and keep-origin redirection from http context."
},
{
"expectation": "allowed",
"origin": "same-http",
"redirection": "no-redirect",
"source_context_list": [],
"source_scheme": "http",
"subresource": "sharedworker-import",
"subresource_policy_deliveries": [],
"test_description": "Content Security Policy: Expects allowed for sharedworker-import to same-http origin and no-redirect redirection from http context."
},
{
"expectation": "blocked",
"origin": "cross-http",
"redirection": "keep-origin",
"source_context_list": [],
"source_scheme": "http",
"subresource": "sharedworker-import",
"subresource_policy_deliveries": [],
"test_description": "Content Security Policy: Expects blocked for sharedworker-import to cross-http origin and keep-origin redirection from http context."
},
{
"expectation": "blocked",
"origin": "cross-http",
"redirection": "no-redirect",
"source_context_list": [],
"source_scheme": "http",
"subresource": "sharedworker-import",
"subresource_policy_deliveries": [],
"test_description": "Content Security Policy: Expects blocked for sharedworker-import to cross-http origin and no-redirect redirection from http context."
},
{
"expectation": "blocked",
"origin": "cross-http",
"redirection": "swap-origin",
"source_context_list": [],
"source_scheme": "http",
"subresource": "sharedworker-import",
"subresource_policy_deliveries": [],
"test_description": "Content Security Policy: Expects blocked for sharedworker-import to cross-http origin and swap-origin redirection from http context."
},
{
"expectation": "blocked",
"origin": "same-http",
"redirection": "swap-origin",
"source_context_list": [],
"source_scheme": "http",
"subresource": "sharedworker-import",
"subresource_policy_deliveries": [],
"test_description": "Content Security Policy: Expects blocked for sharedworker-import to same-http origin and swap-origin redirection from http context."
}
],
new SanityChecker()
).start();
</script>
<div id="log"></div>
</body>
</html>

View file

@ -0,0 +1 @@
Content-Security-Policy: script-src 'self' 'unsafe-inline'

View file

@ -0,0 +1,82 @@
<!DOCTYPE html>
<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec content-security-policy/` -->
<html>
<head>
<meta charset="utf-8">
<meta name="timeout" content="long">
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
<script src="/common/security-features/resources/common.sub.js"></script>
<script src="../../../generic/test-case.sub.js"></script>
</head>
<body>
<script>
TestCase(
[
{
"expectation": "allowed",
"origin": "same-https",
"redirection": "keep-origin",
"source_context_list": [],
"source_scheme": "https",
"subresource": "sharedworker-import",
"subresource_policy_deliveries": [],
"test_description": "Content Security Policy: Expects allowed for sharedworker-import to same-https origin and keep-origin redirection from https context."
},
{
"expectation": "allowed",
"origin": "same-https",
"redirection": "no-redirect",
"source_context_list": [],
"source_scheme": "https",
"subresource": "sharedworker-import",
"subresource_policy_deliveries": [],
"test_description": "Content Security Policy: Expects allowed for sharedworker-import to same-https origin and no-redirect redirection from https context."
},
{
"expectation": "blocked",
"origin": "cross-https",
"redirection": "keep-origin",
"source_context_list": [],
"source_scheme": "https",
"subresource": "sharedworker-import",
"subresource_policy_deliveries": [],
"test_description": "Content Security Policy: Expects blocked for sharedworker-import to cross-https origin and keep-origin redirection from https context."
},
{
"expectation": "blocked",
"origin": "cross-https",
"redirection": "no-redirect",
"source_context_list": [],
"source_scheme": "https",
"subresource": "sharedworker-import",
"subresource_policy_deliveries": [],
"test_description": "Content Security Policy: Expects blocked for sharedworker-import to cross-https origin and no-redirect redirection from https context."
},
{
"expectation": "blocked",
"origin": "cross-https",
"redirection": "swap-origin",
"source_context_list": [],
"source_scheme": "https",
"subresource": "sharedworker-import",
"subresource_policy_deliveries": [],
"test_description": "Content Security Policy: Expects blocked for sharedworker-import to cross-https origin and swap-origin redirection from https context."
},
{
"expectation": "blocked",
"origin": "same-https",
"redirection": "swap-origin",
"source_context_list": [],
"source_scheme": "https",
"subresource": "sharedworker-import",
"subresource_policy_deliveries": [],
"test_description": "Content Security Policy: Expects blocked for sharedworker-import to same-https origin and swap-origin redirection from https context."
}
],
new SanityChecker()
).start();
</script>
<div id="log"></div>
</body>
</html>

View file

@ -0,0 +1 @@
Content-Security-Policy: script-src 'self' 'unsafe-inline'

View file

@ -0,0 +1,42 @@
<!DOCTYPE html>
<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec content-security-policy/` -->
<html>
<head>
<meta charset="utf-8">
<meta name="timeout" content="long">
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
<script src="/common/security-features/resources/common.sub.js"></script>
<script src="../../../generic/test-case.sub.js"></script>
</head>
<body>
<script>
TestCase(
[
{
"expectation": "allowed",
"origin": "same-http",
"redirection": "keep-origin",
"source_context_list": [],
"source_scheme": "http",
"subresource": "sharedworker-module",
"subresource_policy_deliveries": [],
"test_description": "Content Security Policy: Expects allowed for sharedworker-module to same-http origin and keep-origin redirection from http context."
},
{
"expectation": "allowed",
"origin": "same-http",
"redirection": "no-redirect",
"source_context_list": [],
"source_scheme": "http",
"subresource": "sharedworker-module",
"subresource_policy_deliveries": [],
"test_description": "Content Security Policy: Expects allowed for sharedworker-module to same-http origin and no-redirect redirection from http context."
}
],
new SanityChecker()
).start();
</script>
<div id="log"></div>
</body>
</html>

View file

@ -0,0 +1 @@
Content-Security-Policy: script-src 'self' 'unsafe-inline'

View file

@ -0,0 +1,42 @@
<!DOCTYPE html>
<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec content-security-policy/` -->
<html>
<head>
<meta charset="utf-8">
<meta name="timeout" content="long">
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
<script src="/common/security-features/resources/common.sub.js"></script>
<script src="../../../generic/test-case.sub.js"></script>
</head>
<body>
<script>
TestCase(
[
{
"expectation": "allowed",
"origin": "same-https",
"redirection": "keep-origin",
"source_context_list": [],
"source_scheme": "https",
"subresource": "sharedworker-module",
"subresource_policy_deliveries": [],
"test_description": "Content Security Policy: Expects allowed for sharedworker-module to same-https origin and keep-origin redirection from https context."
},
{
"expectation": "allowed",
"origin": "same-https",
"redirection": "no-redirect",
"source_context_list": [],
"source_scheme": "https",
"subresource": "sharedworker-module",
"subresource_policy_deliveries": [],
"test_description": "Content Security Policy: Expects allowed for sharedworker-module to same-https origin and no-redirect redirection from https context."
}
],
new SanityChecker()
).start();
</script>
<div id="log"></div>
</body>
</html>

View file

@ -0,0 +1 @@
Content-Security-Policy: script-src 'self' 'unsafe-inline'

View file

@ -0,0 +1,42 @@
<!DOCTYPE html>
<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec content-security-policy/` -->
<html>
<head>
<meta charset="utf-8">
<meta name="timeout" content="long">
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
<script src="/common/security-features/resources/common.sub.js"></script>
<script src="../../../generic/test-case.sub.js"></script>
</head>
<body>
<script>
TestCase(
[
{
"expectation": "allowed",
"origin": "same-http",
"redirection": "keep-origin",
"source_context_list": [],
"source_scheme": "http",
"subresource": "worker-classic",
"subresource_policy_deliveries": [],
"test_description": "Content Security Policy: Expects allowed for worker-classic to same-http origin and keep-origin redirection from http context."
},
{
"expectation": "allowed",
"origin": "same-http",
"redirection": "no-redirect",
"source_context_list": [],
"source_scheme": "http",
"subresource": "worker-classic",
"subresource_policy_deliveries": [],
"test_description": "Content Security Policy: Expects allowed for worker-classic to same-http origin and no-redirect redirection from http context."
}
],
new SanityChecker()
).start();
</script>
<div id="log"></div>
</body>
</html>

View file

@ -0,0 +1 @@
Content-Security-Policy: script-src 'self' 'unsafe-inline'

View file

@ -0,0 +1,42 @@
<!DOCTYPE html>
<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec content-security-policy/` -->
<html>
<head>
<meta charset="utf-8">
<meta name="timeout" content="long">
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
<script src="/common/security-features/resources/common.sub.js"></script>
<script src="../../../generic/test-case.sub.js"></script>
</head>
<body>
<script>
TestCase(
[
{
"expectation": "allowed",
"origin": "same-https",
"redirection": "keep-origin",
"source_context_list": [],
"source_scheme": "https",
"subresource": "worker-classic",
"subresource_policy_deliveries": [],
"test_description": "Content Security Policy: Expects allowed for worker-classic to same-https origin and keep-origin redirection from https context."
},
{
"expectation": "allowed",
"origin": "same-https",
"redirection": "no-redirect",
"source_context_list": [],
"source_scheme": "https",
"subresource": "worker-classic",
"subresource_policy_deliveries": [],
"test_description": "Content Security Policy: Expects allowed for worker-classic to same-https origin and no-redirect redirection from https context."
}
],
new SanityChecker()
).start();
</script>
<div id="log"></div>
</body>
</html>

View file

@ -0,0 +1 @@
Content-Security-Policy: script-src 'self' 'unsafe-inline'

View file

@ -0,0 +1,82 @@
<!DOCTYPE html>
<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec content-security-policy/` -->
<html>
<head>
<meta charset="utf-8">
<meta name="timeout" content="long">
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
<script src="/common/security-features/resources/common.sub.js"></script>
<script src="../../../generic/test-case.sub.js"></script>
</head>
<body>
<script>
TestCase(
[
{
"expectation": "blocked",
"origin": "cross-http",
"redirection": "keep-origin",
"source_context_list": [],
"source_scheme": "http",
"subresource": "worker-import-data",
"subresource_policy_deliveries": [],
"test_description": "Content Security Policy: Expects blocked for worker-import-data to cross-http origin and keep-origin redirection from http context."
},
{
"expectation": "blocked",
"origin": "cross-http",
"redirection": "no-redirect",
"source_context_list": [],
"source_scheme": "http",
"subresource": "worker-import-data",
"subresource_policy_deliveries": [],
"test_description": "Content Security Policy: Expects blocked for worker-import-data to cross-http origin and no-redirect redirection from http context."
},
{
"expectation": "blocked",
"origin": "cross-http",
"redirection": "swap-origin",
"source_context_list": [],
"source_scheme": "http",
"subresource": "worker-import-data",
"subresource_policy_deliveries": [],
"test_description": "Content Security Policy: Expects blocked for worker-import-data to cross-http origin and swap-origin redirection from http context."
},
{
"expectation": "blocked",
"origin": "same-http",
"redirection": "keep-origin",
"source_context_list": [],
"source_scheme": "http",
"subresource": "worker-import-data",
"subresource_policy_deliveries": [],
"test_description": "Content Security Policy: Expects blocked for worker-import-data to same-http origin and keep-origin redirection from http context."
},
{
"expectation": "blocked",
"origin": "same-http",
"redirection": "no-redirect",
"source_context_list": [],
"source_scheme": "http",
"subresource": "worker-import-data",
"subresource_policy_deliveries": [],
"test_description": "Content Security Policy: Expects blocked for worker-import-data to same-http origin and no-redirect redirection from http context."
},
{
"expectation": "blocked",
"origin": "same-http",
"redirection": "swap-origin",
"source_context_list": [],
"source_scheme": "http",
"subresource": "worker-import-data",
"subresource_policy_deliveries": [],
"test_description": "Content Security Policy: Expects blocked for worker-import-data to same-http origin and swap-origin redirection from http context."
}
],
new SanityChecker()
).start();
</script>
<div id="log"></div>
</body>
</html>

View file

@ -0,0 +1 @@
Content-Security-Policy: script-src 'self' 'unsafe-inline'

View file

@ -0,0 +1,82 @@
<!DOCTYPE html>
<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec content-security-policy/` -->
<html>
<head>
<meta charset="utf-8">
<meta name="timeout" content="long">
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
<script src="/common/security-features/resources/common.sub.js"></script>
<script src="../../../generic/test-case.sub.js"></script>
</head>
<body>
<script>
TestCase(
[
{
"expectation": "blocked",
"origin": "cross-https",
"redirection": "keep-origin",
"source_context_list": [],
"source_scheme": "https",
"subresource": "worker-import-data",
"subresource_policy_deliveries": [],
"test_description": "Content Security Policy: Expects blocked for worker-import-data to cross-https origin and keep-origin redirection from https context."
},
{
"expectation": "blocked",
"origin": "cross-https",
"redirection": "no-redirect",
"source_context_list": [],
"source_scheme": "https",
"subresource": "worker-import-data",
"subresource_policy_deliveries": [],
"test_description": "Content Security Policy: Expects blocked for worker-import-data to cross-https origin and no-redirect redirection from https context."
},
{
"expectation": "blocked",
"origin": "cross-https",
"redirection": "swap-origin",
"source_context_list": [],
"source_scheme": "https",
"subresource": "worker-import-data",
"subresource_policy_deliveries": [],
"test_description": "Content Security Policy: Expects blocked for worker-import-data to cross-https origin and swap-origin redirection from https context."
},
{
"expectation": "blocked",
"origin": "same-https",
"redirection": "keep-origin",
"source_context_list": [],
"source_scheme": "https",
"subresource": "worker-import-data",
"subresource_policy_deliveries": [],
"test_description": "Content Security Policy: Expects blocked for worker-import-data to same-https origin and keep-origin redirection from https context."
},
{
"expectation": "blocked",
"origin": "same-https",
"redirection": "no-redirect",
"source_context_list": [],
"source_scheme": "https",
"subresource": "worker-import-data",
"subresource_policy_deliveries": [],
"test_description": "Content Security Policy: Expects blocked for worker-import-data to same-https origin and no-redirect redirection from https context."
},
{
"expectation": "blocked",
"origin": "same-https",
"redirection": "swap-origin",
"source_context_list": [],
"source_scheme": "https",
"subresource": "worker-import-data",
"subresource_policy_deliveries": [],
"test_description": "Content Security Policy: Expects blocked for worker-import-data to same-https origin and swap-origin redirection from https context."
}
],
new SanityChecker()
).start();
</script>
<div id="log"></div>
</body>
</html>

View file

@ -0,0 +1 @@
Content-Security-Policy: script-src 'self' 'unsafe-inline'

View file

@ -0,0 +1,82 @@
<!DOCTYPE html>
<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec content-security-policy/` -->
<html>
<head>
<meta charset="utf-8">
<meta name="timeout" content="long">
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
<script src="/common/security-features/resources/common.sub.js"></script>
<script src="../../../generic/test-case.sub.js"></script>
</head>
<body>
<script>
TestCase(
[
{
"expectation": "allowed",
"origin": "same-http",
"redirection": "keep-origin",
"source_context_list": [],
"source_scheme": "http",
"subresource": "worker-import",
"subresource_policy_deliveries": [],
"test_description": "Content Security Policy: Expects allowed for worker-import to same-http origin and keep-origin redirection from http context."
},
{
"expectation": "allowed",
"origin": "same-http",
"redirection": "no-redirect",
"source_context_list": [],
"source_scheme": "http",
"subresource": "worker-import",
"subresource_policy_deliveries": [],
"test_description": "Content Security Policy: Expects allowed for worker-import to same-http origin and no-redirect redirection from http context."
},
{
"expectation": "blocked",
"origin": "cross-http",
"redirection": "keep-origin",
"source_context_list": [],
"source_scheme": "http",
"subresource": "worker-import",
"subresource_policy_deliveries": [],
"test_description": "Content Security Policy: Expects blocked for worker-import to cross-http origin and keep-origin redirection from http context."
},
{
"expectation": "blocked",
"origin": "cross-http",
"redirection": "no-redirect",
"source_context_list": [],
"source_scheme": "http",
"subresource": "worker-import",
"subresource_policy_deliveries": [],
"test_description": "Content Security Policy: Expects blocked for worker-import to cross-http origin and no-redirect redirection from http context."
},
{
"expectation": "blocked",
"origin": "cross-http",
"redirection": "swap-origin",
"source_context_list": [],
"source_scheme": "http",
"subresource": "worker-import",
"subresource_policy_deliveries": [],
"test_description": "Content Security Policy: Expects blocked for worker-import to cross-http origin and swap-origin redirection from http context."
},
{
"expectation": "blocked",
"origin": "same-http",
"redirection": "swap-origin",
"source_context_list": [],
"source_scheme": "http",
"subresource": "worker-import",
"subresource_policy_deliveries": [],
"test_description": "Content Security Policy: Expects blocked for worker-import to same-http origin and swap-origin redirection from http context."
}
],
new SanityChecker()
).start();
</script>
<div id="log"></div>
</body>
</html>

View file

@ -0,0 +1 @@
Content-Security-Policy: script-src 'self' 'unsafe-inline'

View file

@ -0,0 +1,82 @@
<!DOCTYPE html>
<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec content-security-policy/` -->
<html>
<head>
<meta charset="utf-8">
<meta name="timeout" content="long">
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
<script src="/common/security-features/resources/common.sub.js"></script>
<script src="../../../generic/test-case.sub.js"></script>
</head>
<body>
<script>
TestCase(
[
{
"expectation": "allowed",
"origin": "same-https",
"redirection": "keep-origin",
"source_context_list": [],
"source_scheme": "https",
"subresource": "worker-import",
"subresource_policy_deliveries": [],
"test_description": "Content Security Policy: Expects allowed for worker-import to same-https origin and keep-origin redirection from https context."
},
{
"expectation": "allowed",
"origin": "same-https",
"redirection": "no-redirect",
"source_context_list": [],
"source_scheme": "https",
"subresource": "worker-import",
"subresource_policy_deliveries": [],
"test_description": "Content Security Policy: Expects allowed for worker-import to same-https origin and no-redirect redirection from https context."
},
{
"expectation": "blocked",
"origin": "cross-https",
"redirection": "keep-origin",
"source_context_list": [],
"source_scheme": "https",
"subresource": "worker-import",
"subresource_policy_deliveries": [],
"test_description": "Content Security Policy: Expects blocked for worker-import to cross-https origin and keep-origin redirection from https context."
},
{
"expectation": "blocked",
"origin": "cross-https",
"redirection": "no-redirect",
"source_context_list": [],
"source_scheme": "https",
"subresource": "worker-import",
"subresource_policy_deliveries": [],
"test_description": "Content Security Policy: Expects blocked for worker-import to cross-https origin and no-redirect redirection from https context."
},
{
"expectation": "blocked",
"origin": "cross-https",
"redirection": "swap-origin",
"source_context_list": [],
"source_scheme": "https",
"subresource": "worker-import",
"subresource_policy_deliveries": [],
"test_description": "Content Security Policy: Expects blocked for worker-import to cross-https origin and swap-origin redirection from https context."
},
{
"expectation": "blocked",
"origin": "same-https",
"redirection": "swap-origin",
"source_context_list": [],
"source_scheme": "https",
"subresource": "worker-import",
"subresource_policy_deliveries": [],
"test_description": "Content Security Policy: Expects blocked for worker-import to same-https origin and swap-origin redirection from https context."
}
],
new SanityChecker()
).start();
</script>
<div id="log"></div>
</body>
</html>

View file

@ -0,0 +1 @@
Content-Security-Policy: script-src 'self' 'unsafe-inline'

Some files were not shown because too many files have changed in this diff Show more