Update web-platform-tests to revision ae1e2d51f38e208f3d07a97b5d82f9ca0dda2c94

This commit is contained in:
WPT Sync Bot 2020-05-14 08:20:34 +00:00
parent 6c506ba260
commit 96553cb7e2
109 changed files with 3903 additions and 298 deletions

View file

@ -0,0 +1,38 @@
<!DOCTYPE html>
<html>
<head>
<title>Referrer with the strict-origin referrer policy</title>
<meta name="referrer" content="strict-origin">
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
</head>
<body>
<script type="module">
// "name" parameter is necessary for bypassing the module map in descendant import.
import { referrer as insecureImport } from "./resources/import-referrer-checker-insecure.sub.js?name=insecure_import";
import { referrer as secureImport } from "https://{{domains[www]}}:{{ports[https][0]}}/html/semantics/scripting-1/the-script-element/module/resources/import-referrer-checker-insecure.sub.js?name=secure_import";
const origin = (new URL(location.href)).origin + "/";
test(t => {
assert_equals(
insecureImport, origin,
"A document with the strict-origin referrer policy served over HTTP, " +
"imports an module script over HTTP, that imports a descendant script " +
"over HTTP. The request for the descendant script is sent with a " +
"`Referer` header with the page's origin");
assert_equals(
secureImport, "",
"A document with the strict-origin referrer policy served over HTTP, " +
"imports an module script over HTTPS, that imports a descendant script " +
"over HTTP. The request for the descendant script is sent with no " +
"`Referer` header");
}, "The strict-* referrer policies compare the trustworthiness of a " +
"request's referrer string against its URL");
</script>
</body>
</html>

View file

@ -0,0 +1 @@
export { referrer } from 'http://{{host}}:{{ports[http][0]}}/html/semantics/scripting-1/the-script-element/module/resources/referrer-checker.py?name={{GET[name]}}';