mirror of
https://github.com/servo/servo.git
synced 2025-08-24 22:58:21 +01:00
Update web-platform-tests to revision 14cfa4d648cc1c853b4153268df672d21425f8c1
This commit is contained in:
parent
1b73cf3352
commit
75736751d9
1213 changed files with 19434 additions and 12344 deletions
|
@ -0,0 +1,40 @@
|
|||
<!DOCTYPE html>
|
||||
<html>
|
||||
|
||||
<head>
|
||||
<!-- Programmatically converted from a WebKit Reftest, please forgive resulting idiosyncracies.-->
|
||||
<meta http-equiv="Content-Security-Policy" content="form-action 'self'; script-src 'self' 'unsafe-inline'; connect-src 'self';">
|
||||
<title>form-action-src-allowed</title>
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<script src='../support/logTest.sub.js?logs=["PASS","TEST COMPLETE"]'></script>
|
||||
<script src="../support/alertAssert.sub.js?alerts=[]"></script>
|
||||
<script>
|
||||
window.addEventListener('securitypolicyviolation', function(e) {
|
||||
log('Fail');
|
||||
});
|
||||
window.addEventListener("message", function(event) {
|
||||
log(event.data);
|
||||
}, false);
|
||||
window.addEventListener('load', function() {
|
||||
setTimeout(function() {
|
||||
document.getElementById('submit').click();
|
||||
log("TEST COMPLETE");
|
||||
}, 0);
|
||||
});
|
||||
|
||||
</script>
|
||||
</head>
|
||||
|
||||
<body>
|
||||
<iframe name="test_target" id="test_iframe"></iframe>
|
||||
|
||||
<form action="/common/redirect.py?location=/content-security-policy/support/postmessage-pass.html" id="theform" method="post" target="test_target">
|
||||
<input type="text" name="fieldname" value="fieldvalue">
|
||||
<input type="submit" id="submit" value="submit">
|
||||
</form>
|
||||
<p>Tests that allowed form actions work correctly.</p>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
|
||||
</html>
|
|
@ -0,0 +1,40 @@
|
|||
<!DOCTYPE html>
|
||||
<html>
|
||||
|
||||
<head>
|
||||
<!-- Programmatically converted from a WebKit Reftest, please forgive resulting idiosyncracies.-->
|
||||
<meta http-equiv="Content-Security-Policy" content="form-action 'none'; script-src 'self' 'unsafe-inline'; connect-src 'self';">
|
||||
<title>form-action-src-blocked</title>
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<script src='../support/logTest.sub.js?logs=["violated-directive=form-action","TEST COMPLETE"]'></script>
|
||||
<script src="../support/alertAssert.sub.js?alerts=[]"></script>
|
||||
<script>
|
||||
window.addEventListener('securitypolicyviolation', function(e) {
|
||||
log('violated-directive=' + e.violatedDirective);
|
||||
});
|
||||
window.addEventListener("message", function(event) {
|
||||
alert_assert(event.data);
|
||||
}, false);
|
||||
window.addEventListener('load', function() {
|
||||
setTimeout(function() {
|
||||
document.getElementById('submit').click();
|
||||
}, 0);
|
||||
});
|
||||
setTimeout(function() {log("TEST COMPLETE");}, 1);
|
||||
|
||||
</script>
|
||||
</head>
|
||||
|
||||
<body>
|
||||
<iframe name="test_target" id="test_iframe"></iframe>
|
||||
<form action="/common/redirect.py?location=/content-security-policy/support/postmessage-fail.html" id="theform" method="post" target="test_target">
|
||||
<input type="text" name="fieldname" value="fieldvalue">
|
||||
<input type="submit" id="submit" value="submit">
|
||||
</form>
|
||||
<p>Tests that blocking form actions works correctly.</p>
|
||||
<div id="log"></div>
|
||||
|
||||
</body>
|
||||
|
||||
</html>
|
|
@ -0,0 +1,40 @@
|
|||
<!DOCTYPE html>
|
||||
<html>
|
||||
|
||||
<head>
|
||||
<!-- Programmatically converted from a WebKit Reftest, please forgive resulting idiosyncracies.-->
|
||||
<meta http-equiv="Content-Security-Policy" content="default-src 'none'; script-src 'self' 'unsafe-inline'; connect-src 'self'; style-src 'self'; frame-src 'self';">
|
||||
<title>form-action-src-default-ignored</title>
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<script src='../support/logTest.sub.js?logs=["PASS","TEST COMPLETE"]'></script>
|
||||
<script src="../support/alertAssert.sub.js?alerts=[]"></script>
|
||||
<script>
|
||||
window.addEventListener('securitypolicyviolation', function(e) {
|
||||
log('Fail');
|
||||
});
|
||||
window.addEventListener("message", function(event) {
|
||||
log(event.data);
|
||||
}, false);
|
||||
window.addEventListener('load', function() {
|
||||
setTimeout(function() {
|
||||
document.getElementById('submit').click();
|
||||
log("TEST COMPLETE");
|
||||
}, 0);
|
||||
});
|
||||
|
||||
</script>
|
||||
</head>
|
||||
|
||||
<body>
|
||||
<iframe name="test_target" id="test_iframe"></iframe>
|
||||
|
||||
<form action="/common/redirect.py?location=/content-security-policy/support/postmessage-pass.html" id="theform" method="post" target="test_target">
|
||||
<input type="text" name="fieldname" value="fieldvalue">
|
||||
<input type="submit" id="submit" value="submit">
|
||||
</form>
|
||||
<p>Tests that default-src does not cascade to form-action.</p>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
|
||||
</html>
|
|
@ -0,0 +1,41 @@
|
|||
<!DOCTYPE html>
|
||||
<html>
|
||||
|
||||
<head>
|
||||
<!-- Programmatically converted from a WebKit Reftest, please forgive resulting idiosyncracies.-->
|
||||
<meta http-equiv="Content-Security-Policy" content="form-action 'self'; script-src 'self' 'unsafe-inline'; connect-src 'self';">
|
||||
<title>form-action-src-allowed</title>
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<script src='../support/logTest.sub.js?logs=["PASS","TEST COMPLETE"]'></script>
|
||||
<script src="../support/alertAssert.sub.js?alerts=[]"></script>
|
||||
<script>
|
||||
window.addEventListener('securitypolicyviolation', function(e) {
|
||||
log('Fail');
|
||||
});
|
||||
window.addEventListener("message", function(event) {
|
||||
log(event.data);
|
||||
}, false);
|
||||
window.addEventListener('load', function() {
|
||||
setTimeout(function() {
|
||||
document.getElementById('submit').click();
|
||||
log("TEST COMPLETE");
|
||||
}, 0);
|
||||
});
|
||||
|
||||
</script>
|
||||
</head>
|
||||
|
||||
<body>
|
||||
<iframe name="test_target" id="test_iframe"></iframe>
|
||||
|
||||
<form action="/content-security-policy/support/postmessage-pass.html" id="theform" method="get" target="test_target">
|
||||
<input type="text" name="fieldname" value="fieldvalue">
|
||||
<input type="submit" id="submit" value="submit">
|
||||
</form>
|
||||
<p>Tests that allowed form actions work correctly
|
||||
with GET and a redirect.</p>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
|
||||
</html>
|
|
@ -0,0 +1,42 @@
|
|||
<!DOCTYPE html>
|
||||
<html>
|
||||
|
||||
<head>
|
||||
<!-- Programmatically converted from a WebKit Reftest, please forgive resulting idiosyncracies.-->
|
||||
<meta http-equiv="Content-Security-Policy" content="form-action 'none'; script-src 'self' 'unsafe-inline'; connect-src 'self';">
|
||||
<title>form-action-src-allowed</title>
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<script src='../support/logTest.sub.js?logs=["violated-directive=form-action","TEST COMPLETE"]'></script>
|
||||
<script src="../support/alertAssert.sub.js?alerts=[]"></script>
|
||||
<script>
|
||||
window.addEventListener('securitypolicyviolation', function(e) {
|
||||
log('violated-directive=' + e.violatedDirective);
|
||||
});
|
||||
window.addEventListener("message", function(event) {
|
||||
alert_assert(event.data);
|
||||
}, false);
|
||||
window.addEventListener('load', function() {
|
||||
setTimeout(function() {
|
||||
document.getElementById('submit').click();
|
||||
log("TEST COMPLETE");
|
||||
}, 0);
|
||||
});
|
||||
|
||||
</script>
|
||||
</head>
|
||||
|
||||
<body>
|
||||
<iframe name="test_target" id="test_iframe"></iframe>
|
||||
|
||||
<form action="/common/redirect.py?location=/content-security-policy/support/postmessage-fail.html" id="theform" method="get" target="test_target">
|
||||
<input type="text" name="fieldname" value="fieldvalue">
|
||||
<input type="submit" id="submit" value="submit">
|
||||
</form>
|
||||
<p>Tests that disallowed form actions are blocked
|
||||
with GET and redirects.</p>
|
||||
<div id="log"></div>
|
||||
"></script>
|
||||
</body>
|
||||
|
||||
</html>
|
|
@ -0,0 +1,34 @@
|
|||
<!DOCTYPE html>
|
||||
<html>
|
||||
|
||||
<head>
|
||||
<!-- Programmatically converted from a WebKit Reftest, please forgive resulting idiosyncracies.-->
|
||||
<meta http-equiv="Content-Security-Policy" content="form-action 'none'; script-src 'self' 'nonce-noncynonce'; connect-src 'self';">
|
||||
<title>form-action-src-javascript-blocked</title>
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<script src='../support/logTest.sub.js?logs=["violated-directive=form-action","TEST COMPLETE"]'></script>
|
||||
<script src="../support/alertAssert.sub.js?alerts=[]"></script>
|
||||
<script nonce='noncynonce'>
|
||||
window.addEventListener('securitypolicyviolation', function(e) {
|
||||
log('violated-directive=' + e.violatedDirective);
|
||||
});
|
||||
window.addEventListener('load', function() {
|
||||
setTimeout(function() {
|
||||
document.getElementById('submit').click();
|
||||
log("TEST COMPLETE");
|
||||
}, 0);
|
||||
});
|
||||
</script>
|
||||
</head>
|
||||
|
||||
<body>
|
||||
<form action="javascript:log("FAIL!")" id="theform" method="post">
|
||||
<input type="text" name="fieldname" value="fieldvalue">
|
||||
<input type="submit" id="submit" value="submit">
|
||||
</form>
|
||||
<p>Tests that blocking form actions works correctly. If this test passes, a CSP violation will be generated, and will not see a JavaScript alert.</p>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
|
||||
</html>
|
|
@ -0,0 +1,41 @@
|
|||
<!DOCTYPE html>
|
||||
<html>
|
||||
|
||||
<head>
|
||||
<!-- Programmatically converted from a WebKit Reftest, please forgive resulting idiosyncracies.-->
|
||||
<meta http-equiv="Content-Security-Policy" content="form-action 'self'; script-src 'self' 'unsafe-inline'; connect-src 'self';">
|
||||
<title>form-action-src-redirect-blocked</title>
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<script src='../support/logTest.sub.js?logs=["violated-directive=form-action","TEST COMPLETE"]'></script>
|
||||
<script src="../support/alertAssert.sub.js?alerts=[]"></script>
|
||||
<script>
|
||||
window.addEventListener('securitypolicyviolation', function(e) {
|
||||
log('violated-directive=' + e.violatedDirective);
|
||||
});
|
||||
window.addEventListener("message", function(event) {
|
||||
alert_assert(event.data);
|
||||
}, false);
|
||||
window.addEventListener('load', function() {
|
||||
setTimeout(function() {
|
||||
document.getElementById('submit').click();
|
||||
log("TEST COMPLETE");
|
||||
}, 0);
|
||||
});
|
||||
setTimeout(function() {}, 1000);
|
||||
|
||||
</script>
|
||||
</head>
|
||||
|
||||
<body>
|
||||
<iframe name="test_target" id="test_iframe"></iframe>
|
||||
|
||||
<form id="form1" action="/common/redirect.py?location=http://{{domains[www1]}}:{{ports[http][0]}}/content-security-policy/support/postmessage-fail.html" method="post" target="test_target">
|
||||
<input type="text" name="fieldname" value="fieldvalue">
|
||||
<input type="submit" id="submit" value="submit">
|
||||
</form>
|
||||
<p>Tests that blocking a POST form with a redirect works correctly. If this test passes, a CSP violation will be generated.</p>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
|
||||
</html>
|
Loading…
Add table
Add a link
Reference in a new issue