mirror of
https://github.com/servo/servo.git
synced 2025-08-24 06:45:33 +01:00
Update web-platform-tests to revision 075802c1d3387d07e31cd5887459d539b1297c8d.
This commit is contained in:
parent
10127d6b5a
commit
881fe95cd1
1617 changed files with 57062 additions and 2789 deletions
|
@ -0,0 +1,41 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
|
||||
<meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
|
||||
<!-- No meta: CSP delivered via HTTP headers. -->
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-unsafe-url">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an http
|
||||
sub-resource via fetch-request using the http-csp
|
||||
delivery method with keep-origin-redirect and when
|
||||
the target request is cross-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "unsafe-url",
|
||||
"delivery_method": "http-csp",
|
||||
"redirection": "keep-origin-redirect",
|
||||
"origin": "cross-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "http",
|
||||
"subresource": "fetch-request",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/xhr.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -0,0 +1,2 @@
|
|||
Content-Security-Policy: referrer unsafe-url
|
||||
Access-Control-Allow-Origin: *
|
|
@ -0,0 +1,41 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
|
||||
<meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
|
||||
<!-- No meta: CSP delivered via HTTP headers. -->
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-unsafe-url">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an http
|
||||
sub-resource via fetch-request using the http-csp
|
||||
delivery method with no-redirect and when
|
||||
the target request is cross-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "unsafe-url",
|
||||
"delivery_method": "http-csp",
|
||||
"redirection": "no-redirect",
|
||||
"origin": "cross-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "http",
|
||||
"subresource": "fetch-request",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/xhr.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -0,0 +1,2 @@
|
|||
Content-Security-Policy: referrer unsafe-url
|
||||
Access-Control-Allow-Origin: *
|
|
@ -0,0 +1,41 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
|
||||
<meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
|
||||
<!-- No meta: CSP delivered via HTTP headers. -->
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-unsafe-url">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an http
|
||||
sub-resource via fetch-request using the http-csp
|
||||
delivery method with swap-origin-redirect and when
|
||||
the target request is cross-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "unsafe-url",
|
||||
"delivery_method": "http-csp",
|
||||
"redirection": "swap-origin-redirect",
|
||||
"origin": "cross-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "http",
|
||||
"subresource": "fetch-request",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/xhr.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -0,0 +1,2 @@
|
|||
Content-Security-Policy: referrer unsafe-url
|
||||
Access-Control-Allow-Origin: *
|
|
@ -0,0 +1,41 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
|
||||
<meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
|
||||
<!-- No meta: CSP delivered via HTTP headers. -->
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-unsafe-url">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an http
|
||||
sub-resource via iframe-tag using the http-csp
|
||||
delivery method with keep-origin-redirect and when
|
||||
the target request is cross-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "unsafe-url",
|
||||
"delivery_method": "http-csp",
|
||||
"redirection": "keep-origin-redirect",
|
||||
"origin": "cross-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "http",
|
||||
"subresource": "iframe-tag",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/document.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -0,0 +1,2 @@
|
|||
Content-Security-Policy: referrer unsafe-url
|
||||
Access-Control-Allow-Origin: *
|
|
@ -0,0 +1,41 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
|
||||
<meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
|
||||
<!-- No meta: CSP delivered via HTTP headers. -->
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-unsafe-url">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an http
|
||||
sub-resource via iframe-tag using the http-csp
|
||||
delivery method with no-redirect and when
|
||||
the target request is cross-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "unsafe-url",
|
||||
"delivery_method": "http-csp",
|
||||
"redirection": "no-redirect",
|
||||
"origin": "cross-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "http",
|
||||
"subresource": "iframe-tag",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/document.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -0,0 +1,2 @@
|
|||
Content-Security-Policy: referrer unsafe-url
|
||||
Access-Control-Allow-Origin: *
|
|
@ -0,0 +1,41 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
|
||||
<meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
|
||||
<!-- No meta: CSP delivered via HTTP headers. -->
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-unsafe-url">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an http
|
||||
sub-resource via iframe-tag using the http-csp
|
||||
delivery method with swap-origin-redirect and when
|
||||
the target request is cross-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "unsafe-url",
|
||||
"delivery_method": "http-csp",
|
||||
"redirection": "swap-origin-redirect",
|
||||
"origin": "cross-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "http",
|
||||
"subresource": "iframe-tag",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/document.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -0,0 +1,2 @@
|
|||
Content-Security-Policy: referrer unsafe-url
|
||||
Access-Control-Allow-Origin: *
|
|
@ -0,0 +1,41 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
|
||||
<meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
|
||||
<!-- No meta: CSP delivered via HTTP headers. -->
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-unsafe-url">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an http
|
||||
sub-resource via img-tag using the http-csp
|
||||
delivery method with keep-origin-redirect and when
|
||||
the target request is cross-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "unsafe-url",
|
||||
"delivery_method": "http-csp",
|
||||
"redirection": "keep-origin-redirect",
|
||||
"origin": "cross-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "http",
|
||||
"subresource": "img-tag",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/image.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -0,0 +1,2 @@
|
|||
Content-Security-Policy: referrer unsafe-url
|
||||
Access-Control-Allow-Origin: *
|
|
@ -0,0 +1,41 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
|
||||
<meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
|
||||
<!-- No meta: CSP delivered via HTTP headers. -->
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-unsafe-url">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an http
|
||||
sub-resource via img-tag using the http-csp
|
||||
delivery method with no-redirect and when
|
||||
the target request is cross-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "unsafe-url",
|
||||
"delivery_method": "http-csp",
|
||||
"redirection": "no-redirect",
|
||||
"origin": "cross-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "http",
|
||||
"subresource": "img-tag",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/image.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -0,0 +1,2 @@
|
|||
Content-Security-Policy: referrer unsafe-url
|
||||
Access-Control-Allow-Origin: *
|
|
@ -0,0 +1,41 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
|
||||
<meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
|
||||
<!-- No meta: CSP delivered via HTTP headers. -->
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-unsafe-url">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an http
|
||||
sub-resource via img-tag using the http-csp
|
||||
delivery method with swap-origin-redirect and when
|
||||
the target request is cross-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "unsafe-url",
|
||||
"delivery_method": "http-csp",
|
||||
"redirection": "swap-origin-redirect",
|
||||
"origin": "cross-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "http",
|
||||
"subresource": "img-tag",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/image.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -0,0 +1,2 @@
|
|||
Content-Security-Policy: referrer unsafe-url
|
||||
Access-Control-Allow-Origin: *
|
|
@ -0,0 +1,41 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
|
||||
<meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
|
||||
<!-- No meta: CSP delivered via HTTP headers. -->
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-unsafe-url">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an http
|
||||
sub-resource via script-tag using the http-csp
|
||||
delivery method with keep-origin-redirect and when
|
||||
the target request is cross-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "unsafe-url",
|
||||
"delivery_method": "http-csp",
|
||||
"redirection": "keep-origin-redirect",
|
||||
"origin": "cross-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "http",
|
||||
"subresource": "script-tag",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/script.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -0,0 +1,2 @@
|
|||
Content-Security-Policy: referrer unsafe-url
|
||||
Access-Control-Allow-Origin: *
|
|
@ -0,0 +1,41 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
|
||||
<meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
|
||||
<!-- No meta: CSP delivered via HTTP headers. -->
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-unsafe-url">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an http
|
||||
sub-resource via script-tag using the http-csp
|
||||
delivery method with no-redirect and when
|
||||
the target request is cross-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "unsafe-url",
|
||||
"delivery_method": "http-csp",
|
||||
"redirection": "no-redirect",
|
||||
"origin": "cross-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "http",
|
||||
"subresource": "script-tag",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/script.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -0,0 +1,2 @@
|
|||
Content-Security-Policy: referrer unsafe-url
|
||||
Access-Control-Allow-Origin: *
|
|
@ -0,0 +1,41 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
|
||||
<meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
|
||||
<!-- No meta: CSP delivered via HTTP headers. -->
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-unsafe-url">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an http
|
||||
sub-resource via script-tag using the http-csp
|
||||
delivery method with swap-origin-redirect and when
|
||||
the target request is cross-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "unsafe-url",
|
||||
"delivery_method": "http-csp",
|
||||
"redirection": "swap-origin-redirect",
|
||||
"origin": "cross-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "http",
|
||||
"subresource": "script-tag",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/script.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -0,0 +1,2 @@
|
|||
Content-Security-Policy: referrer unsafe-url
|
||||
Access-Control-Allow-Origin: *
|
|
@ -0,0 +1,41 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
|
||||
<meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
|
||||
<!-- No meta: CSP delivered via HTTP headers. -->
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-unsafe-url">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an http
|
||||
sub-resource via xhr-request using the http-csp
|
||||
delivery method with keep-origin-redirect and when
|
||||
the target request is cross-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "unsafe-url",
|
||||
"delivery_method": "http-csp",
|
||||
"redirection": "keep-origin-redirect",
|
||||
"origin": "cross-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "http",
|
||||
"subresource": "xhr-request",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/xhr.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -0,0 +1,2 @@
|
|||
Content-Security-Policy: referrer unsafe-url
|
||||
Access-Control-Allow-Origin: *
|
|
@ -0,0 +1,41 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
|
||||
<meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
|
||||
<!-- No meta: CSP delivered via HTTP headers. -->
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-unsafe-url">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an http
|
||||
sub-resource via xhr-request using the http-csp
|
||||
delivery method with no-redirect and when
|
||||
the target request is cross-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "unsafe-url",
|
||||
"delivery_method": "http-csp",
|
||||
"redirection": "no-redirect",
|
||||
"origin": "cross-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "http",
|
||||
"subresource": "xhr-request",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/xhr.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -0,0 +1,2 @@
|
|||
Content-Security-Policy: referrer unsafe-url
|
||||
Access-Control-Allow-Origin: *
|
|
@ -0,0 +1,41 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
|
||||
<meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
|
||||
<!-- No meta: CSP delivered via HTTP headers. -->
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-unsafe-url">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an http
|
||||
sub-resource via xhr-request using the http-csp
|
||||
delivery method with swap-origin-redirect and when
|
||||
the target request is cross-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "unsafe-url",
|
||||
"delivery_method": "http-csp",
|
||||
"redirection": "swap-origin-redirect",
|
||||
"origin": "cross-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "http",
|
||||
"subresource": "xhr-request",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/xhr.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -0,0 +1,2 @@
|
|||
Content-Security-Policy: referrer unsafe-url
|
||||
Access-Control-Allow-Origin: *
|
|
@ -0,0 +1,41 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
|
||||
<meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
|
||||
<!-- No meta: CSP delivered via HTTP headers. -->
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-unsafe-url">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an https
|
||||
sub-resource via fetch-request using the http-csp
|
||||
delivery method with keep-origin-redirect and when
|
||||
the target request is cross-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "unsafe-url",
|
||||
"delivery_method": "http-csp",
|
||||
"redirection": "keep-origin-redirect",
|
||||
"origin": "cross-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "https",
|
||||
"subresource": "fetch-request",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/xhr.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -0,0 +1,2 @@
|
|||
Content-Security-Policy: referrer unsafe-url
|
||||
Access-Control-Allow-Origin: *
|
|
@ -0,0 +1,41 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
|
||||
<meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
|
||||
<!-- No meta: CSP delivered via HTTP headers. -->
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-unsafe-url">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an https
|
||||
sub-resource via fetch-request using the http-csp
|
||||
delivery method with no-redirect and when
|
||||
the target request is cross-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "unsafe-url",
|
||||
"delivery_method": "http-csp",
|
||||
"redirection": "no-redirect",
|
||||
"origin": "cross-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "https",
|
||||
"subresource": "fetch-request",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/xhr.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -0,0 +1,2 @@
|
|||
Content-Security-Policy: referrer unsafe-url
|
||||
Access-Control-Allow-Origin: *
|
|
@ -0,0 +1,41 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
|
||||
<meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
|
||||
<!-- No meta: CSP delivered via HTTP headers. -->
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-unsafe-url">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an https
|
||||
sub-resource via fetch-request using the http-csp
|
||||
delivery method with swap-origin-redirect and when
|
||||
the target request is cross-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "unsafe-url",
|
||||
"delivery_method": "http-csp",
|
||||
"redirection": "swap-origin-redirect",
|
||||
"origin": "cross-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "https",
|
||||
"subresource": "fetch-request",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/xhr.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -0,0 +1,2 @@
|
|||
Content-Security-Policy: referrer unsafe-url
|
||||
Access-Control-Allow-Origin: *
|
|
@ -0,0 +1,41 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
|
||||
<meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
|
||||
<!-- No meta: CSP delivered via HTTP headers. -->
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-unsafe-url">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an https
|
||||
sub-resource via iframe-tag using the http-csp
|
||||
delivery method with keep-origin-redirect and when
|
||||
the target request is cross-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "unsafe-url",
|
||||
"delivery_method": "http-csp",
|
||||
"redirection": "keep-origin-redirect",
|
||||
"origin": "cross-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "https",
|
||||
"subresource": "iframe-tag",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/document.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -0,0 +1,2 @@
|
|||
Content-Security-Policy: referrer unsafe-url
|
||||
Access-Control-Allow-Origin: *
|
|
@ -0,0 +1,41 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
|
||||
<meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
|
||||
<!-- No meta: CSP delivered via HTTP headers. -->
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-unsafe-url">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an https
|
||||
sub-resource via iframe-tag using the http-csp
|
||||
delivery method with no-redirect and when
|
||||
the target request is cross-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "unsafe-url",
|
||||
"delivery_method": "http-csp",
|
||||
"redirection": "no-redirect",
|
||||
"origin": "cross-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "https",
|
||||
"subresource": "iframe-tag",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/document.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -0,0 +1,2 @@
|
|||
Content-Security-Policy: referrer unsafe-url
|
||||
Access-Control-Allow-Origin: *
|
|
@ -0,0 +1,41 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
|
||||
<meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
|
||||
<!-- No meta: CSP delivered via HTTP headers. -->
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-unsafe-url">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an https
|
||||
sub-resource via iframe-tag using the http-csp
|
||||
delivery method with swap-origin-redirect and when
|
||||
the target request is cross-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "unsafe-url",
|
||||
"delivery_method": "http-csp",
|
||||
"redirection": "swap-origin-redirect",
|
||||
"origin": "cross-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "https",
|
||||
"subresource": "iframe-tag",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/document.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -0,0 +1,2 @@
|
|||
Content-Security-Policy: referrer unsafe-url
|
||||
Access-Control-Allow-Origin: *
|
|
@ -0,0 +1,41 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
|
||||
<meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
|
||||
<!-- No meta: CSP delivered via HTTP headers. -->
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-unsafe-url">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an https
|
||||
sub-resource via img-tag using the http-csp
|
||||
delivery method with keep-origin-redirect and when
|
||||
the target request is cross-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "unsafe-url",
|
||||
"delivery_method": "http-csp",
|
||||
"redirection": "keep-origin-redirect",
|
||||
"origin": "cross-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "https",
|
||||
"subresource": "img-tag",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/image.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -0,0 +1,2 @@
|
|||
Content-Security-Policy: referrer unsafe-url
|
||||
Access-Control-Allow-Origin: *
|
|
@ -0,0 +1,41 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
|
||||
<meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
|
||||
<!-- No meta: CSP delivered via HTTP headers. -->
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-unsafe-url">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an https
|
||||
sub-resource via img-tag using the http-csp
|
||||
delivery method with no-redirect and when
|
||||
the target request is cross-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "unsafe-url",
|
||||
"delivery_method": "http-csp",
|
||||
"redirection": "no-redirect",
|
||||
"origin": "cross-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "https",
|
||||
"subresource": "img-tag",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/image.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -0,0 +1,2 @@
|
|||
Content-Security-Policy: referrer unsafe-url
|
||||
Access-Control-Allow-Origin: *
|
|
@ -0,0 +1,41 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
|
||||
<meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
|
||||
<!-- No meta: CSP delivered via HTTP headers. -->
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-unsafe-url">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an https
|
||||
sub-resource via img-tag using the http-csp
|
||||
delivery method with swap-origin-redirect and when
|
||||
the target request is cross-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "unsafe-url",
|
||||
"delivery_method": "http-csp",
|
||||
"redirection": "swap-origin-redirect",
|
||||
"origin": "cross-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "https",
|
||||
"subresource": "img-tag",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/image.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -0,0 +1,2 @@
|
|||
Content-Security-Policy: referrer unsafe-url
|
||||
Access-Control-Allow-Origin: *
|
|
@ -0,0 +1,41 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
|
||||
<meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
|
||||
<!-- No meta: CSP delivered via HTTP headers. -->
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-unsafe-url">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an https
|
||||
sub-resource via script-tag using the http-csp
|
||||
delivery method with keep-origin-redirect and when
|
||||
the target request is cross-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "unsafe-url",
|
||||
"delivery_method": "http-csp",
|
||||
"redirection": "keep-origin-redirect",
|
||||
"origin": "cross-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "https",
|
||||
"subresource": "script-tag",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/script.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -0,0 +1,2 @@
|
|||
Content-Security-Policy: referrer unsafe-url
|
||||
Access-Control-Allow-Origin: *
|
|
@ -0,0 +1,41 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
|
||||
<meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
|
||||
<!-- No meta: CSP delivered via HTTP headers. -->
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-unsafe-url">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an https
|
||||
sub-resource via script-tag using the http-csp
|
||||
delivery method with no-redirect and when
|
||||
the target request is cross-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "unsafe-url",
|
||||
"delivery_method": "http-csp",
|
||||
"redirection": "no-redirect",
|
||||
"origin": "cross-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "https",
|
||||
"subresource": "script-tag",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/script.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -0,0 +1,2 @@
|
|||
Content-Security-Policy: referrer unsafe-url
|
||||
Access-Control-Allow-Origin: *
|
|
@ -0,0 +1,41 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
|
||||
<meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
|
||||
<!-- No meta: CSP delivered via HTTP headers. -->
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-unsafe-url">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an https
|
||||
sub-resource via script-tag using the http-csp
|
||||
delivery method with swap-origin-redirect and when
|
||||
the target request is cross-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "unsafe-url",
|
||||
"delivery_method": "http-csp",
|
||||
"redirection": "swap-origin-redirect",
|
||||
"origin": "cross-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "https",
|
||||
"subresource": "script-tag",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/script.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -0,0 +1,2 @@
|
|||
Content-Security-Policy: referrer unsafe-url
|
||||
Access-Control-Allow-Origin: *
|
|
@ -0,0 +1,41 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
|
||||
<meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
|
||||
<!-- No meta: CSP delivered via HTTP headers. -->
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-unsafe-url">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an https
|
||||
sub-resource via xhr-request using the http-csp
|
||||
delivery method with keep-origin-redirect and when
|
||||
the target request is cross-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "unsafe-url",
|
||||
"delivery_method": "http-csp",
|
||||
"redirection": "keep-origin-redirect",
|
||||
"origin": "cross-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "https",
|
||||
"subresource": "xhr-request",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/xhr.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -0,0 +1,2 @@
|
|||
Content-Security-Policy: referrer unsafe-url
|
||||
Access-Control-Allow-Origin: *
|
|
@ -0,0 +1,41 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
|
||||
<meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
|
||||
<!-- No meta: CSP delivered via HTTP headers. -->
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-unsafe-url">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an https
|
||||
sub-resource via xhr-request using the http-csp
|
||||
delivery method with no-redirect and when
|
||||
the target request is cross-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "unsafe-url",
|
||||
"delivery_method": "http-csp",
|
||||
"redirection": "no-redirect",
|
||||
"origin": "cross-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "https",
|
||||
"subresource": "xhr-request",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/xhr.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -0,0 +1,2 @@
|
|||
Content-Security-Policy: referrer unsafe-url
|
||||
Access-Control-Allow-Origin: *
|
|
@ -0,0 +1,41 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
|
||||
<meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
|
||||
<!-- No meta: CSP delivered via HTTP headers. -->
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-unsafe-url">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an https
|
||||
sub-resource via xhr-request using the http-csp
|
||||
delivery method with swap-origin-redirect and when
|
||||
the target request is cross-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "unsafe-url",
|
||||
"delivery_method": "http-csp",
|
||||
"redirection": "swap-origin-redirect",
|
||||
"origin": "cross-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "https",
|
||||
"subresource": "xhr-request",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/xhr.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -0,0 +1,2 @@
|
|||
Content-Security-Policy: referrer unsafe-url
|
||||
Access-Control-Allow-Origin: *
|
|
@ -0,0 +1,41 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
|
||||
<meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
|
||||
<!-- No meta: CSP delivered via HTTP headers. -->
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-unsafe-url">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an http
|
||||
sub-resource via fetch-request using the http-csp
|
||||
delivery method with keep-origin-redirect and when
|
||||
the target request is same-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "unsafe-url",
|
||||
"delivery_method": "http-csp",
|
||||
"redirection": "keep-origin-redirect",
|
||||
"origin": "same-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "http",
|
||||
"subresource": "fetch-request",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/xhr.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -0,0 +1,2 @@
|
|||
Content-Security-Policy: referrer unsafe-url
|
||||
Access-Control-Allow-Origin: *
|
|
@ -0,0 +1,41 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
|
||||
<meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
|
||||
<!-- No meta: CSP delivered via HTTP headers. -->
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-unsafe-url">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an http
|
||||
sub-resource via fetch-request using the http-csp
|
||||
delivery method with no-redirect and when
|
||||
the target request is same-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "unsafe-url",
|
||||
"delivery_method": "http-csp",
|
||||
"redirection": "no-redirect",
|
||||
"origin": "same-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "http",
|
||||
"subresource": "fetch-request",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/xhr.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -0,0 +1,2 @@
|
|||
Content-Security-Policy: referrer unsafe-url
|
||||
Access-Control-Allow-Origin: *
|
|
@ -0,0 +1,41 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
|
||||
<meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
|
||||
<!-- No meta: CSP delivered via HTTP headers. -->
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-unsafe-url">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an http
|
||||
sub-resource via fetch-request using the http-csp
|
||||
delivery method with swap-origin-redirect and when
|
||||
the target request is same-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "unsafe-url",
|
||||
"delivery_method": "http-csp",
|
||||
"redirection": "swap-origin-redirect",
|
||||
"origin": "same-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "http",
|
||||
"subresource": "fetch-request",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/xhr.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -0,0 +1,2 @@
|
|||
Content-Security-Policy: referrer unsafe-url
|
||||
Access-Control-Allow-Origin: *
|
|
@ -0,0 +1,41 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
|
||||
<meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
|
||||
<!-- No meta: CSP delivered via HTTP headers. -->
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-unsafe-url">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an http
|
||||
sub-resource via iframe-tag using the http-csp
|
||||
delivery method with keep-origin-redirect and when
|
||||
the target request is same-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "unsafe-url",
|
||||
"delivery_method": "http-csp",
|
||||
"redirection": "keep-origin-redirect",
|
||||
"origin": "same-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "http",
|
||||
"subresource": "iframe-tag",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/document.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -0,0 +1,2 @@
|
|||
Content-Security-Policy: referrer unsafe-url
|
||||
Access-Control-Allow-Origin: *
|
|
@ -0,0 +1,41 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
|
||||
<meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
|
||||
<!-- No meta: CSP delivered via HTTP headers. -->
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-unsafe-url">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an http
|
||||
sub-resource via iframe-tag using the http-csp
|
||||
delivery method with no-redirect and when
|
||||
the target request is same-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "unsafe-url",
|
||||
"delivery_method": "http-csp",
|
||||
"redirection": "no-redirect",
|
||||
"origin": "same-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "http",
|
||||
"subresource": "iframe-tag",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/document.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -0,0 +1,2 @@
|
|||
Content-Security-Policy: referrer unsafe-url
|
||||
Access-Control-Allow-Origin: *
|
|
@ -0,0 +1,41 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
|
||||
<meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
|
||||
<!-- No meta: CSP delivered via HTTP headers. -->
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-unsafe-url">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an http
|
||||
sub-resource via iframe-tag using the http-csp
|
||||
delivery method with swap-origin-redirect and when
|
||||
the target request is same-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "unsafe-url",
|
||||
"delivery_method": "http-csp",
|
||||
"redirection": "swap-origin-redirect",
|
||||
"origin": "same-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "http",
|
||||
"subresource": "iframe-tag",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/document.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -0,0 +1,2 @@
|
|||
Content-Security-Policy: referrer unsafe-url
|
||||
Access-Control-Allow-Origin: *
|
|
@ -0,0 +1,41 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
|
||||
<meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
|
||||
<!-- No meta: CSP delivered via HTTP headers. -->
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-unsafe-url">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an http
|
||||
sub-resource via img-tag using the http-csp
|
||||
delivery method with keep-origin-redirect and when
|
||||
the target request is same-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "unsafe-url",
|
||||
"delivery_method": "http-csp",
|
||||
"redirection": "keep-origin-redirect",
|
||||
"origin": "same-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "http",
|
||||
"subresource": "img-tag",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/image.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -0,0 +1,2 @@
|
|||
Content-Security-Policy: referrer unsafe-url
|
||||
Access-Control-Allow-Origin: *
|
|
@ -0,0 +1,41 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
|
||||
<meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
|
||||
<!-- No meta: CSP delivered via HTTP headers. -->
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-unsafe-url">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an http
|
||||
sub-resource via img-tag using the http-csp
|
||||
delivery method with no-redirect and when
|
||||
the target request is same-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "unsafe-url",
|
||||
"delivery_method": "http-csp",
|
||||
"redirection": "no-redirect",
|
||||
"origin": "same-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "http",
|
||||
"subresource": "img-tag",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/image.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -0,0 +1,2 @@
|
|||
Content-Security-Policy: referrer unsafe-url
|
||||
Access-Control-Allow-Origin: *
|
|
@ -0,0 +1,41 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
|
||||
<meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
|
||||
<!-- No meta: CSP delivered via HTTP headers. -->
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-unsafe-url">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an http
|
||||
sub-resource via img-tag using the http-csp
|
||||
delivery method with swap-origin-redirect and when
|
||||
the target request is same-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "unsafe-url",
|
||||
"delivery_method": "http-csp",
|
||||
"redirection": "swap-origin-redirect",
|
||||
"origin": "same-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "http",
|
||||
"subresource": "img-tag",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/image.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -0,0 +1,2 @@
|
|||
Content-Security-Policy: referrer unsafe-url
|
||||
Access-Control-Allow-Origin: *
|
|
@ -0,0 +1,41 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
|
||||
<meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
|
||||
<!-- No meta: CSP delivered via HTTP headers. -->
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-unsafe-url">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an http
|
||||
sub-resource via script-tag using the http-csp
|
||||
delivery method with keep-origin-redirect and when
|
||||
the target request is same-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "unsafe-url",
|
||||
"delivery_method": "http-csp",
|
||||
"redirection": "keep-origin-redirect",
|
||||
"origin": "same-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "http",
|
||||
"subresource": "script-tag",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/script.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -0,0 +1,2 @@
|
|||
Content-Security-Policy: referrer unsafe-url
|
||||
Access-Control-Allow-Origin: *
|
|
@ -0,0 +1,41 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
|
||||
<meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
|
||||
<!-- No meta: CSP delivered via HTTP headers. -->
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-unsafe-url">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an http
|
||||
sub-resource via script-tag using the http-csp
|
||||
delivery method with no-redirect and when
|
||||
the target request is same-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "unsafe-url",
|
||||
"delivery_method": "http-csp",
|
||||
"redirection": "no-redirect",
|
||||
"origin": "same-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "http",
|
||||
"subresource": "script-tag",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/script.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -0,0 +1,2 @@
|
|||
Content-Security-Policy: referrer unsafe-url
|
||||
Access-Control-Allow-Origin: *
|
|
@ -0,0 +1,41 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
|
||||
<meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
|
||||
<!-- No meta: CSP delivered via HTTP headers. -->
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-unsafe-url">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an http
|
||||
sub-resource via script-tag using the http-csp
|
||||
delivery method with swap-origin-redirect and when
|
||||
the target request is same-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "unsafe-url",
|
||||
"delivery_method": "http-csp",
|
||||
"redirection": "swap-origin-redirect",
|
||||
"origin": "same-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "http",
|
||||
"subresource": "script-tag",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/script.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -0,0 +1,2 @@
|
|||
Content-Security-Policy: referrer unsafe-url
|
||||
Access-Control-Allow-Origin: *
|
|
@ -0,0 +1,41 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
|
||||
<meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
|
||||
<!-- No meta: CSP delivered via HTTP headers. -->
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-unsafe-url">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an http
|
||||
sub-resource via xhr-request using the http-csp
|
||||
delivery method with keep-origin-redirect and when
|
||||
the target request is same-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "unsafe-url",
|
||||
"delivery_method": "http-csp",
|
||||
"redirection": "keep-origin-redirect",
|
||||
"origin": "same-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "http",
|
||||
"subresource": "xhr-request",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/xhr.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -0,0 +1,2 @@
|
|||
Content-Security-Policy: referrer unsafe-url
|
||||
Access-Control-Allow-Origin: *
|
|
@ -0,0 +1,41 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
|
||||
<meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
|
||||
<!-- No meta: CSP delivered via HTTP headers. -->
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-unsafe-url">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an http
|
||||
sub-resource via xhr-request using the http-csp
|
||||
delivery method with no-redirect and when
|
||||
the target request is same-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "unsafe-url",
|
||||
"delivery_method": "http-csp",
|
||||
"redirection": "no-redirect",
|
||||
"origin": "same-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "http",
|
||||
"subresource": "xhr-request",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/xhr.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -0,0 +1,2 @@
|
|||
Content-Security-Policy: referrer unsafe-url
|
||||
Access-Control-Allow-Origin: *
|
|
@ -0,0 +1,41 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
|
||||
<meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
|
||||
<!-- No meta: CSP delivered via HTTP headers. -->
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-unsafe-url">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an http
|
||||
sub-resource via xhr-request using the http-csp
|
||||
delivery method with swap-origin-redirect and when
|
||||
the target request is same-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "unsafe-url",
|
||||
"delivery_method": "http-csp",
|
||||
"redirection": "swap-origin-redirect",
|
||||
"origin": "same-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "http",
|
||||
"subresource": "xhr-request",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/xhr.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -0,0 +1,2 @@
|
|||
Content-Security-Policy: referrer unsafe-url
|
||||
Access-Control-Allow-Origin: *
|
|
@ -0,0 +1,41 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
|
||||
<meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
|
||||
<!-- No meta: CSP delivered via HTTP headers. -->
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-unsafe-url">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an https
|
||||
sub-resource via fetch-request using the http-csp
|
||||
delivery method with keep-origin-redirect and when
|
||||
the target request is same-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "unsafe-url",
|
||||
"delivery_method": "http-csp",
|
||||
"redirection": "keep-origin-redirect",
|
||||
"origin": "same-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "https",
|
||||
"subresource": "fetch-request",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/xhr.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -0,0 +1,2 @@
|
|||
Content-Security-Policy: referrer unsafe-url
|
||||
Access-Control-Allow-Origin: *
|
|
@ -0,0 +1,41 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
|
||||
<meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
|
||||
<!-- No meta: CSP delivered via HTTP headers. -->
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-unsafe-url">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an https
|
||||
sub-resource via fetch-request using the http-csp
|
||||
delivery method with no-redirect and when
|
||||
the target request is same-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "unsafe-url",
|
||||
"delivery_method": "http-csp",
|
||||
"redirection": "no-redirect",
|
||||
"origin": "same-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "https",
|
||||
"subresource": "fetch-request",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/xhr.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -0,0 +1,2 @@
|
|||
Content-Security-Policy: referrer unsafe-url
|
||||
Access-Control-Allow-Origin: *
|
|
@ -0,0 +1,41 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
|
||||
<meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
|
||||
<!-- No meta: CSP delivered via HTTP headers. -->
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-unsafe-url">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an https
|
||||
sub-resource via fetch-request using the http-csp
|
||||
delivery method with swap-origin-redirect and when
|
||||
the target request is same-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "unsafe-url",
|
||||
"delivery_method": "http-csp",
|
||||
"redirection": "swap-origin-redirect",
|
||||
"origin": "same-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "https",
|
||||
"subresource": "fetch-request",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/xhr.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -0,0 +1,2 @@
|
|||
Content-Security-Policy: referrer unsafe-url
|
||||
Access-Control-Allow-Origin: *
|
|
@ -0,0 +1,41 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
|
||||
<meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
|
||||
<!-- No meta: CSP delivered via HTTP headers. -->
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-unsafe-url">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an https
|
||||
sub-resource via iframe-tag using the http-csp
|
||||
delivery method with keep-origin-redirect and when
|
||||
the target request is same-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "unsafe-url",
|
||||
"delivery_method": "http-csp",
|
||||
"redirection": "keep-origin-redirect",
|
||||
"origin": "same-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "https",
|
||||
"subresource": "iframe-tag",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/document.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -0,0 +1,2 @@
|
|||
Content-Security-Policy: referrer unsafe-url
|
||||
Access-Control-Allow-Origin: *
|
|
@ -0,0 +1,41 @@
|
|||
<!DOCTYPE html>
|
||||
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
|
||||
<html>
|
||||
<head>
|
||||
<title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title>
|
||||
<meta name="description" content="Check that all sub-resources get the stripped referrer URL.">
|
||||
<!-- No meta: CSP delivered via HTTP headers. -->
|
||||
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
|
||||
<link rel="help" href="https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-unsafe-url">
|
||||
<meta name="assert" content="The referrer URL is stripped-referrer when a
|
||||
document served over http requires an https
|
||||
sub-resource via iframe-tag using the http-csp
|
||||
delivery method with no-redirect and when
|
||||
the target request is same-origin.">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<!-- TODO(kristijanburnik): Minify and merge both: -->
|
||||
<script src="/referrer-policy/generic/common.js"></script>
|
||||
<script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
|
||||
</head>
|
||||
<body>
|
||||
<script>
|
||||
ReferrerPolicyTestCase(
|
||||
{
|
||||
"referrer_policy": "unsafe-url",
|
||||
"delivery_method": "http-csp",
|
||||
"redirection": "no-redirect",
|
||||
"origin": "same-origin",
|
||||
"source_protocol": "http",
|
||||
"target_protocol": "https",
|
||||
"subresource": "iframe-tag",
|
||||
"subresource_path": "/referrer-policy/generic/subresource/document.py",
|
||||
"referrer_url": "stripped-referrer"
|
||||
},
|
||||
document.querySelector("meta[name=assert]").content,
|
||||
new SanityChecker()
|
||||
).start();
|
||||
</script>
|
||||
<div id="log"></div>
|
||||
</body>
|
||||
</html>
|
|
@ -0,0 +1,2 @@
|
|||
Content-Security-Policy: referrer unsafe-url
|
||||
Access-Control-Allow-Origin: *
|
Some files were not shown because too many files have changed in this diff Show more
Loading…
Add table
Add a link
Reference in a new issue