mirror of
https://github.com/servo/servo.git
synced 2025-10-04 02:29:12 +01:00
Update web-platform-tests to revision 68a256f49be380ca4add535ce8ece9de28820e6b
This commit is contained in:
parent
e54935c25a
commit
cd5bf022bd
178 changed files with 6082 additions and 795 deletions
|
@ -0,0 +1,34 @@
|
|||
<!DOCTYPE html>
|
||||
<html>
|
||||
<head>
|
||||
<title>form-action-src-redirect-allowed-target-blank</title>
|
||||
<meta http-equiv="Content-Security-Policy" content="form-action 'self'">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<script>
|
||||
function OnDocumentLoaded() {
|
||||
let test = async_test("form submission targetting _blank allowed after a redirect");
|
||||
window.addEventListener("message", function(event) {
|
||||
if (event.data == "DocumentNotBlocked") {
|
||||
event.source.close();
|
||||
test.done();
|
||||
}
|
||||
});
|
||||
|
||||
let form = document.getElementById("form");
|
||||
form.action =
|
||||
"/content-security-policy/form-action/support/post-message-to-opener.sub.html";
|
||||
|
||||
let submit = document.getElementById("submit");
|
||||
submit.click();
|
||||
}
|
||||
</script>
|
||||
</head>
|
||||
<body onload="OnDocumentLoaded();">
|
||||
<form id="form" method="GET" target="_blank">
|
||||
<input type="hidden" name="message" value="DocumentNotBlocked">
|
||||
<input type="submit" id="submit">
|
||||
</form>
|
||||
</body>
|
||||
</html>
|
||||
|
|
@ -0,0 +1,34 @@
|
|||
<!DOCTYPE html>
|
||||
<html>
|
||||
<head>
|
||||
<title>form-action-src-allowed-target-frame</title>
|
||||
<meta http-equiv="Content-Security-Policy" content="form-action 'self'">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<script>
|
||||
function OnDocumentLoaded() {
|
||||
let test = async_test("form submission targetting a frame allowed");
|
||||
window.addEventListener("message", function(event) {
|
||||
if (event.data == "DocumentNotBlocked") {
|
||||
test.done();
|
||||
}
|
||||
});
|
||||
|
||||
let form = document.getElementById("form");
|
||||
form.action =
|
||||
"/content-security-policy/form-action/support/post-message-to-parent.sub.html";
|
||||
|
||||
let submit = document.getElementById("submit");
|
||||
submit.click();
|
||||
}
|
||||
</script>
|
||||
</head>
|
||||
<body onload="OnDocumentLoaded();">
|
||||
<form id="form" method="GET" target="frame">
|
||||
<input type="hidden" name="message" value="DocumentNotBlocked">
|
||||
<input type="submit" id="submit">
|
||||
</form>
|
||||
<iframe name="frame"></iframe>
|
||||
</body>
|
||||
</html>
|
||||
|
|
@ -0,0 +1,34 @@
|
|||
<!DOCTYPE html>
|
||||
<html>
|
||||
<head>
|
||||
<title>form-action-src-redirect-allowed-target-blank</title>
|
||||
<meta http-equiv="Content-Security-Policy" content="form-action 'self'">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<script>
|
||||
function OnDocumentLoaded() {
|
||||
let test = async_test("form submission targetting _blank allowed after a redirect");
|
||||
window.addEventListener("message", function(event) {
|
||||
if (event.data == "DocumentNotBlocked") {
|
||||
event.source.close();
|
||||
test.done();
|
||||
}
|
||||
});
|
||||
|
||||
let form = document.getElementById("form");
|
||||
let final_url = "/content-security-policy/form-action/support/post-message-to-opener.sub.html?message=DocumentNotBlocked";
|
||||
let redirect_url = "/common/redirect.py?location=";
|
||||
form.action = redirect_url + encodeURIComponent(final_url);
|
||||
|
||||
let submit = document.getElementById("submit");
|
||||
submit.click();
|
||||
}
|
||||
</script>
|
||||
</head>
|
||||
<body onload="OnDocumentLoaded();">
|
||||
<form id="form" method="POST" target="_blank">
|
||||
<input type="submit" id="submit">
|
||||
</form>
|
||||
</body>
|
||||
</html>
|
||||
|
|
@ -0,0 +1,34 @@
|
|||
<!DOCTYPE html>
|
||||
<html>
|
||||
<head>
|
||||
<title>form-action-src-redirect-allowed-target-frame</title>
|
||||
<meta http-equiv="Content-Security-Policy" content="form-action 'self'">
|
||||
<script src="/resources/testharness.js"></script>
|
||||
<script src="/resources/testharnessreport.js"></script>
|
||||
<script>
|
||||
function OnDocumentLoaded() {
|
||||
let test = async_test("form submission targetting a frame allowed after a redirect");
|
||||
window.addEventListener("message", function(event) {
|
||||
if (event.data == "DocumentNotBlocked") {
|
||||
test.done();
|
||||
}
|
||||
});
|
||||
|
||||
let form = document.getElementById("form");
|
||||
let final_url = "/content-security-policy/form-action/support/post-message-to-parent.sub.html?message=DocumentNotBlocked";
|
||||
let redirect_url = "/common/redirect.py?location=";
|
||||
form.action = redirect_url + encodeURIComponent(final_url);
|
||||
|
||||
let submit = document.getElementById("submit");
|
||||
submit.click();
|
||||
}
|
||||
</script>
|
||||
</head>
|
||||
<body onload="OnDocumentLoaded();">
|
||||
<form id="form" method="POST" target="frame">
|
||||
<input type="submit" id="submit">
|
||||
</form>
|
||||
<iframe name="frame"></iframe>
|
||||
</body>
|
||||
</html>
|
||||
|
|
@ -0,0 +1,3 @@
|
|||
<script>
|
||||
opener.postMessage("{{GET[message]}}", "*");
|
||||
</script>
|
|
@ -0,0 +1,3 @@
|
|||
<script>
|
||||
parent.postMessage("{{GET[message]}}", "*");
|
||||
</script>
|
|
@ -12,7 +12,7 @@
|
|||
<body>
|
||||
<script>
|
||||
for (var i = 0; i<5; i++)
|
||||
setTimeout("alert('PASS: setTimeout #" + i + " executed.');", 0);
|
||||
setTimeout("document.body.innerHTML += ('<p>PASS: setTimeout #" + i + " executed.');", 0);
|
||||
</script>
|
||||
<script async defer src='../support/checkReport.sub.js?reportField=violated-directive&reportValue=script-src%20%27unsafe-inline%27%20%27self%27&reportCount=1'></script>
|
||||
</body>
|
||||
|
|
|
@ -0,0 +1,2 @@
|
|||
var url = new URL("../support/ping.js", document.baseURI).toString();
|
||||
assert_worker_is_loaded(url, document.getElementById("foo").getAttribute("data-desc-fallback"));
|
|
@ -0,0 +1,2 @@
|
|||
var url = new URL("../support/ping.js", document.baseURI).toString();
|
||||
assert_service_worker_is_loaded(url, document.getElementById("foo").getAttribute("data-desc-fallback"));
|
|
@ -0,0 +1,2 @@
|
|||
var url = new URL("../support/ping.js", document.baseURI).toString();
|
||||
assert_shared_worker_is_loaded(url, document.getElementById("foo").getAttribute("data-desc-fallback"));
|
|
@ -0,0 +1,9 @@
|
|||
<!doctype html>
|
||||
<meta charset=utf-8>
|
||||
<title>Web platform test for dedicated worker allowed by child-src self</title>
|
||||
<script src=/resources/testharness.js></script>
|
||||
<script src=/resources/testharnessreport.js></script>
|
||||
<script src="../support/testharness-helper.js"></script>
|
||||
<!-- Ideally we would use "script-src 'none'" alone but we have to whitelist the actual script that spawns the workers, hence the nonce.-->
|
||||
<meta http-equiv="Content-Security-Policy" content="child-src 'self'; script-src 'none' 'nonce-foo'; default-src 'none'; ">
|
||||
<script src="../support/dedicated-worker-helper.js" nonce="foo" id="foo" data-desc-fallback="Same-origin dedicated worker allowed by child-src 'self'."></script>
|
|
@ -0,0 +1,8 @@
|
|||
<!doctype html>
|
||||
<meta charset=utf-8>
|
||||
<title>Web platform test for dedicated worker allowed by default-src self</title>
|
||||
<script src=/resources/testharness.js></script>
|
||||
<script src=/resources/testharnessreport.js></script>
|
||||
<script src="../support/testharness-helper.js"></script>
|
||||
<meta http-equiv="Content-Security-Policy" content="default-src 'self'">
|
||||
<script src="../support/dedicated-worker-helper.js" id="foo" data-desc-fallback="Same-origin dedicated worker allowed by default-src 'self'."></script>
|
|
@ -0,0 +1,8 @@
|
|||
<!doctype html>
|
||||
<meta charset=utf-8>
|
||||
<title>Web platform test for dedicated worker allowed by script-src self</title>
|
||||
<script src=/resources/testharness.js></script>
|
||||
<script src=/resources/testharnessreport.js></script>
|
||||
<script src="../support/testharness-helper.js"></script>
|
||||
<meta http-equiv="Content-Security-Policy" content="script-src 'self'; default-src 'none'; ">
|
||||
<script src="../support/dedicated-worker-helper.js" id="foo" data-desc-fallback="Same-origin dedicated worker allowed by script-src 'self'."></script>
|
|
@ -0,0 +1,9 @@
|
|||
<!doctype html>
|
||||
<meta charset=utf-8>
|
||||
<title>Web platform test for dedicated worker allowed by worker-src self</title>
|
||||
<script src=/resources/testharness.js></script>
|
||||
<script src=/resources/testharnessreport.js></script>
|
||||
<script src="../support/testharness-helper.js"></script>
|
||||
<!-- Ideally we would use "script-src 'none'" alone but we have to whitelist the actual script that spawns the workers, hence the nonce.-->
|
||||
<meta http-equiv="Content-Security-Policy" content="worker-src 'self'; child-src 'none'; script-src 'none' 'nonce-foo'; default-src 'none'; ">
|
||||
<script src="../support/dedicated-worker-helper.js" nonce="foo" id="foo" data-desc-fallback="Same-origin dedicated worker allowed by worker-src 'self'."></script>
|
|
@ -0,0 +1,9 @@
|
|||
<!doctype html>
|
||||
<meta charset=utf-8>
|
||||
<title>Web platform test for service worker allowed by child-src self</title>
|
||||
<script src=/resources/testharness.js></script>
|
||||
<script src=/resources/testharnessreport.js></script>
|
||||
<script src="../support/testharness-helper.js"></script>
|
||||
<!-- Ideally we would use "script-src 'none'" alone but we have to whitelist the actual script that spawns the workers, hence the nonce.-->
|
||||
<meta http-equiv="Content-Security-Policy" content="child-src 'self'; script-src 'none' 'nonce-foo'; default-src 'none'; ">
|
||||
<script src="../support/service-worker-helper.js" nonce="foo" id="foo" data-desc-fallback="Same-origin service worker allowed by child-src 'self'."></script>
|
|
@ -0,0 +1,8 @@
|
|||
<!doctype html>
|
||||
<meta charset=utf-8>
|
||||
<title>Web platform test for service worker allowed by default-src self</title>
|
||||
<script src=/resources/testharness.js></script>
|
||||
<script src=/resources/testharnessreport.js></script>
|
||||
<script src="../support/testharness-helper.js"></script>
|
||||
<meta http-equiv="Content-Security-Policy" content="default-src 'self'">
|
||||
<script src="../support/service-worker-helper.js" id="foo" data-desc-fallback="Same-origin service worker allowed by default-src 'self'."></script>
|
|
@ -0,0 +1,8 @@
|
|||
<!doctype html>
|
||||
<meta charset=utf-8>
|
||||
<title>Web platform test for service worker allowed by script-src self</title>
|
||||
<script src=/resources/testharness.js></script>
|
||||
<script src=/resources/testharnessreport.js></script>
|
||||
<script src="../support/testharness-helper.js"></script>
|
||||
<meta http-equiv="Content-Security-Policy" content="script-src 'self'; default-src 'none'; ">
|
||||
<script src="../support/service-worker-helper.js" id="foo" data-desc-fallback="Same-origin service worker allowed by script-src 'self'."></script>
|
|
@ -0,0 +1,9 @@
|
|||
<!doctype html>
|
||||
<meta charset=utf-8>
|
||||
<title>Web platform test for service worker allowed by worker-src self</title>
|
||||
<script src=/resources/testharness.js></script>
|
||||
<script src=/resources/testharnessreport.js></script>
|
||||
<script src="../support/testharness-helper.js"></script>
|
||||
<!-- Ideally we would use "script-src 'none'" alone but we have to whitelist the actual script that spawns the workers, hence the nonce.-->
|
||||
<meta http-equiv="Content-Security-Policy" content="worker-src 'self'; child-src 'none'; script-src 'none' 'nonce-foo'; default-src 'none'; ">
|
||||
<script src="../support/service-worker-helper.js" nonce="foo" id="foo" data-desc-fallback="Same-origin service worker allowed by worker-src 'self'."></script>
|
|
@ -0,0 +1,9 @@
|
|||
<!doctype html>
|
||||
<meta charset=utf-8>
|
||||
<title>Web platform test for shared worker allowed by child-src self</title>
|
||||
<script src=/resources/testharness.js></script>
|
||||
<script src=/resources/testharnessreport.js></script>
|
||||
<script src="../support/testharness-helper.js"></script>
|
||||
<!-- Ideally we would use "script-src 'none'" alone but we have to whitelist the actual script that spawns the workers, hence the nonce.-->
|
||||
<meta http-equiv="Content-Security-Policy" content="child-src 'self'; script-src 'none' 'nonce-foo'; default-src 'none'; ">
|
||||
<script src="../support/shared-worker-helper.js" nonce="foo" id="foo" data-desc-fallback="Same-origin shared worker allowed by child-src 'self'."></script>
|
|
@ -0,0 +1,8 @@
|
|||
<!doctype html>
|
||||
<meta charset=utf-8>
|
||||
<title>Web platform test for shared worker allowed by default-src self</title>
|
||||
<script src=/resources/testharness.js></script>
|
||||
<script src=/resources/testharnessreport.js></script>
|
||||
<script src="../support/testharness-helper.js"></script>
|
||||
<meta http-equiv="Content-Security-Policy" content="default-src 'self'">
|
||||
<script src="../support/shared-worker-helper.js" id="foo" data-desc-fallback="Same-origin shared worker allowed by default-src 'self'."></script>
|
|
@ -0,0 +1,8 @@
|
|||
<!doctype html>
|
||||
<meta charset=utf-8>
|
||||
<title>Web platform test for shared worker allowed by script-src self</title>
|
||||
<script src=/resources/testharness.js></script>
|
||||
<script src=/resources/testharnessreport.js></script>
|
||||
<script src="../support/testharness-helper.js"></script>
|
||||
<meta http-equiv="Content-Security-Policy" content="script-src 'self'; default-src 'none'; ">
|
||||
<script src="../support/shared-worker-helper.js" id="foo" data-desc-fallback="Same-origin shared worker allowed by script-src 'self'."></script>
|
|
@ -0,0 +1,9 @@
|
|||
<!doctype html>
|
||||
<meta charset=utf-8>
|
||||
<title>Web platform test for shared worker allowed by worker-src self</title>
|
||||
<script src=/resources/testharness.js></script>
|
||||
<script src=/resources/testharnessreport.js></script>
|
||||
<script src="../support/testharness-helper.js"></script>
|
||||
<!-- Ideally we would use "script-src 'none'" alone but we have to whitelist the actual script that spawns the workers, hence the nonce.-->
|
||||
<meta http-equiv="Content-Security-Policy" content="worker-src 'self'; child-src 'none'; script-src 'none' 'nonce-foo'; default-src 'none'; ">
|
||||
<script src="../support/shared-worker-helper.js" nonce="foo" id="foo" data-desc-fallback="Same-origin shared worker allowed by worker-src 'self'."></script>
|
Loading…
Add table
Add a link
Reference in a new issue