mirror of
https://github.com/servo/servo.git
synced 2025-08-17 03:15:34 +01:00
Update web-platform-tests to revision 14cfa4d648cc1c853b4153268df672d21425f8c1
This commit is contained in:
parent
1b73cf3352
commit
75736751d9
1213 changed files with 19434 additions and 12344 deletions
|
@ -0,0 +1,28 @@
|
|||
<!DOCTYPE html>
|
||||
<html>
|
||||
<head>
|
||||
<meta http-equiv="Content-Security-Policy" content="img-src 'self'; script-src 'self' 'unsafe-inline'; connect-src 'self';">
|
||||
<script src='/resources/testharness.js'></script>
|
||||
<script src='/resources/testharnessreport.js'></script>
|
||||
</head>
|
||||
<body>
|
||||
<p>Use callbacks to show that favicons are loaded as allowed by CSP when link tags are dynamically added to the page.</p>
|
||||
<script>
|
||||
var t = async_test("Test that image loads");
|
||||
window.addEventListener("securitypolicyviolation", t.unreached_func("Should not have triggered any violation events"));
|
||||
|
||||
function createLink(rel, src) {
|
||||
var link = document.createElement('link');
|
||||
link.rel = rel;
|
||||
link.href = src;
|
||||
link.onload = t.done();
|
||||
link.onerror = t.unreached_func('The image should have loaded');
|
||||
document.body.appendChild(link);
|
||||
}
|
||||
window.addEventListener('DOMContentLoaded', function() {
|
||||
createLink('icon', '../support/pass.png');
|
||||
});
|
||||
|
||||
</script>
|
||||
</body>
|
||||
</html>
|
|
@ -0,0 +1,33 @@
|
|||
<!DOCTYPE html>
|
||||
<html>
|
||||
<head>
|
||||
<meta http-equiv="Content-Security-Policy" content="img-src 'none'; script-src 'self' 'unsafe-inline'; connect-src 'self';">
|
||||
<script src='/resources/testharness.js'></script>
|
||||
<script src='/resources/testharnessreport.js'></script>
|
||||
</head>
|
||||
<body>
|
||||
<p>Use callbacks to show that favicons are not loaded in violation of CSP when link tags are dynamically added to the page.</p>
|
||||
<script>
|
||||
var t = async_test("Test that image does not load");
|
||||
var t_spv = async_test("Test that spv event is fired");
|
||||
window.addEventListener("securitypolicyviolation", t_spv.step_func_done(function(e) {
|
||||
assert_equals(e.violatedDirective, 'img-src');
|
||||
assert_true(e.blockedURI.endsWith('/support/fail.png'));
|
||||
}));
|
||||
|
||||
function createLink(rel, src) {
|
||||
var link = document.createElement('link');
|
||||
link.rel = rel;
|
||||
link.href = src;
|
||||
link.onerror = t.done();
|
||||
link.onload = t.unreached_func('The image should not have loaded');
|
||||
document.head.appendChild(link);
|
||||
}
|
||||
window.addEventListener('DOMContentLoaded', function() {
|
||||
createLink('icon', '../support/fail.png');
|
||||
});
|
||||
|
||||
</script>
|
||||
</body>
|
||||
|
||||
</html>
|
|
@ -0,0 +1,25 @@
|
|||
<!DOCTYPE html>
|
||||
<html>
|
||||
|
||||
<head>
|
||||
<!-- Programmatically converted from a WebKit Reftest, please forgive resulting idiosyncracies.-->
|
||||
<meta http-equiv="Content-Security-Policy" content="img-src 'none'; script-src 'self' 'unsafe-inline'; connect-src 'self';">
|
||||
<title>report-blocked-data-uri</title>
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<script src='../support/logTest.sub.js?logs=["violated-directive=img-src"]'></script>
|
||||
<script src="../support/alertAssert.sub.js?alerts=[]"></script>
|
||||
</head>
|
||||
|
||||
<body>
|
||||
<script>
|
||||
window.addEventListener('securitypolicyviolation', function(e) {
|
||||
log("violated-directive=" + e.violatedDirective);
|
||||
});
|
||||
</script>
|
||||
|
||||
<img src="data:image/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==">
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
|
||||
</html>
|
Loading…
Add table
Add a link
Reference in a new issue