Update web-platform-tests to revision 14cfa4d648cc1c853b4153268df672d21425f8c1

This commit is contained in:
Josh Matthews 2017-10-30 09:31:22 -04:00
parent 1b73cf3352
commit 75736751d9
1213 changed files with 19434 additions and 12344 deletions

View file

@ -0,0 +1,36 @@
<!DOCTYPE html>
<html>
<head>
<!-- Programmatically converted from a WebKit Reftest, please forgive resulting idiosyncracies.-->
<meta http-equiv="Content-Security-Policy" content="script-src 'self' 'unsafe-inline'; connect-src 'self'; child-src 'self';">
<title>blob-urls-do-not-match-self</title>
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
<script src='../support/logTest.sub.js?logs=["violated-directive=script-src"]'></script>
<script src='../support/alertAssert.sub.js?alerts=[]'></script>
</head>
<body>
<p>
blob: URLs are same-origin with the page in which they were created, but explicitly do not match the &apos;self&apos; or '*' source in CSP directives because they are more akin to 'unsafe-inline' content.
</p>
<script>
window.addEventListener('securitypolicyviolation', function(e) {
log("violated-directive=" + e.violatedDirective);
});
function fail() {
alert_assert("FAIL!");
}
var b = new Blob(['fail();'], {
type: 'application/javascript'
});
var script = document.createElement('script');
script.src = URL.createObjectURL(b);
document.body.appendChild(script);
</script>
<div id="log"></div>
</body>
</html>

View file

@ -0,0 +1,37 @@
<!DOCTYPE html>
<html>
<head>
<!-- Programmatically converted from a WebKit Reftest, please forgive resulting idiosyncracies.-->
<meta http-equiv="Content-Security-Policy" content="script-src 'self' 'unsafe-inline' blob:; connect-src 'self';">
<title>blob-urls-match-blob</title>
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
<script src='../support/logTest.sub.js?logs=["PASS (1/1)"]'></script>
<script src="../support/alertAssert.sub.js?alerts=[]"></script>
</head>
<body>
<p>
blob: URLs are same-origin with the page in which they were created, but match only if the blob: scheme is specified.
</p>
<script>
window.addEventListener('securitypolicyviolation', function(e) {
log("FAIL");
});
function pass() {
log("PASS (1/1)");
}
var b = new Blob(['pass();'], {
type: 'application/javascript'
});
var script = document.createElement('script');
script.src = URL.createObjectURL(b);
document.body.appendChild(script);
</script>
<div id="log"></div>
</body>
</html>

View file

@ -0,0 +1,49 @@
<!DOCTYPE html>
<html>
<head>
<!-- Programmatically converted from a WebKit Reftest, please forgive resulting idiosyncracies.-->
<meta http-equiv="Content-Security-Policy" content="connect-src 'self'; script-src 'self' 'unsafe-inline'; child-src 'self';">
<title>worker-connect-src-blocked</title>
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
<script src='../support/logTest.sub.js?logs=["violated-directive=worker-src","TEST COMPLETE"]'></script>
<script src='../support/alertAssert.sub.js?alerts=[]'></script>
</head>
<p>This test loads a worker, from a guid.
The worker should be blocked from loading with a child-src policy of 'self'
as the blob: scheme must be specified explicitly.
A report should be sent to the report-uri specified
with this resource.</p>
<body>
<script>
window.addEventListener('securitypolicyviolation', function(e) {
log("violated-directive=" + e.violatedDirective);
});
try {
var blob = new Blob([
"postMessage('FAIL');" +
"postMessage('TEST COMPLETE');"
],
{type : 'application/javascript'});
var url = URL.createObjectURL(blob);
var worker = new Worker(url);
worker.onmessage = function(event) {
alert_assert(event.data);
};
worker.onerror = function(event) {
log('TEST COMPLETE');
event.preventDefault();
}
} catch (e) {
log('TEST COMPLETE');
}
function timeout() {
log('TEST COMPLETE');
}
</script>
<div id="log"></div>
</body>
</html>

View file

@ -0,0 +1,49 @@
<!DOCTYPE html>
<html>
<head>
<!-- Programmatically converted from a WebKit Reftest, please forgive resulting idiosyncracies.-->
<meta http-equiv="Content-Security-Policy" content="connect-src 'self'; script-src 'self' 'unsafe-inline'; child-src *;">
<title>worker-connect-src-blocked</title>
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
<script src='../support/logTest.sub.js?logs=["violated-directive=worker-src","TEST COMPLETE"]'></script>
</head>
<p>This test loads a worker, from a guid.
The worker should be blocked from loading with a child-src policy of *
as the blob: scheme must be specified explicitly.
A report should be sent to the report-uri specified
with this resource.</p>
<body>
<script>
window.addEventListener('securitypolicyviolation', function(e) {
log("violated-directive=" + e.violatedDirective);
});
try {
var blob = new Blob([
"postMessage('FAIL');" +
"postMessage('TEST COMPLETE');"
],
{type : 'application/javascript'});
var url = URL.createObjectURL(blob);
var worker = new Worker(url);
worker.onmessage = function(event) {
log(event.data);
};
worker.onerror = function(event) {
event.preventDefault();
log('TEST COMPLETE');
}
} catch (e) {
log('TEST COMPLETE');
}
function timeout() {
log('TEST COMPLETE');
}
</script>
<div id="log"></div>
</body>
</html>