Update web-platform-tests to revision 78f764c05c229883e87ad135c7153051a66e2851

This commit is contained in:
WPT Sync Bot 2019-03-06 20:32:15 -05:00
parent 55347aa39f
commit bf84a079f9
1983 changed files with 58006 additions and 31437 deletions

View file

@ -1 +1 @@
Sec-Origin-Policy: policy-features
Sec-Origin-Policy: policy=policy-features

View file

@ -0,0 +1,22 @@
<!DOCTYPE HTML>
<html>
<head>
<title>Test that Origin Policy report-to are deliverd to the declared reporting group</title>
<script src='/resources/testharness.js'></script>
<script src='/resources/testharnessreport.js'></script>
</head>
<body>
<iframe id="frame" src="about:blank"></iframe>
<script>
// Navigate the frame to a URL that declares an (invalid) origin policy with
// a report-to directive.
document.getElementById("frame").src =
"https://{{hosts[alt][]}}:{{ports[https][0]}}/origin-policy/sec-origin-policy-subframe.html";
</script>
<script async defer src='/content-security-policy/support/checkReport.sub.js?reportField=policy&reportValue=nonexistingpolicy'>
// This re-uses CSP reporting test infrastructure, and contains the actual
// test. In addition to sanity checks, it will check whether the report body
// contains a key/value pair as indicated by reportField and reportValue.
</script>
</body>
</html>

View file

@ -0,0 +1 @@
Set-Cookie: origin-policy-report-to=5b4d35b6-0771-46fe-8700-ed2bb59ed4be; Path=/origin-policy/

View file

@ -1 +1 @@
Sec-Origin-Policy: policy-noimg
Sec-Origin-Policy: policy=policy-noimg

View file

@ -11,7 +11,7 @@ def main(request, response):
response_policy = request.GET.first("policy", default="")
if request_policy and response_policy:
response.headers.set(origin_policy_header, response_policy)
response.headers.set(origin_policy_header, "policy=%s" % response_policy)
response.headers.set("Vary", "sec-origin-policy")
response.headers.set("Content-Type", "text/html");

View file

@ -0,0 +1,3 @@
The forbidden frame.
Content shouldn't matter, because this frame shouldn't be loaded.
So there.

View file

@ -0,0 +1,3 @@
Report-To: { "group": "report-to-group", "max_age": 1000, "endpoints": [{ "url": "https://{{hosts[alt][]}}:{{ports[https][0]}}/content-security-policy/support/report.py?op=put&reportID=5b4d35b6-0771-46fe-8700-ed2bb59ed4be" }] }
Sec-Origin-Policy: policy=nonexistingpolicy, report-to=report-to-group