aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorbors-servo <lbergstrom+bors@mozilla.com>2019-01-10 00:22:00 -0500
committerGitHub <noreply@github.com>2019-01-10 00:22:00 -0500
commit61893dde1400d1e391faf5e52e7af5fb989a2dbb (patch)
tree17f0f9c4d4a8d86eaf61fa56039d9c8605167cf9
parent192fbafd11126744a299558d14c4b2c63e3cd2ca (diff)
parent59ef536d5e8aed6aa4f4dd0105b4920c4a437bc5 (diff)
downloadservo-61893dde1400d1e391faf5e52e7af5fb989a2dbb.tar.gz
servo-61893dde1400d1e391faf5e52e7af5fb989a2dbb.zip
Auto merge of #22665 - servo-wpt-sync:wpt_update_09-01-2019, r=jdm
Sync WPT with upstream (09-01-2019) Automated downstream sync of changes from upstream as of 09-01-2019. [no-wpt-sync] <!-- Reviewable:start --> --- This change is [<img src="https://reviewable.io/review_button.svg" height="34" align="absmiddle" alt="Reviewable"/>](https://reviewable.io/reviews/servo/servo/22665) <!-- Reviewable:end -->
-rw-r--r--tests/wpt/metadata/2dcontext/drawing-images-to-the-canvas/drawimage_svg_image_with_foreign_object_does_not_taint.html.ini5
-rw-r--r--tests/wpt/metadata/MANIFEST.json953
-rw-r--r--tests/wpt/metadata/css/css-backgrounds/background-image-centered-with-border-radius.html.ini2
-rw-r--r--tests/wpt/metadata/css/css-fonts/variations/at-font-face-font-matching.html.ini3
-rw-r--r--tests/wpt/metadata/css/css-transitions/transitions-animatable-properties-01.html.ini3
-rw-r--r--tests/wpt/metadata/encoding/encodeInto.any.js.ini261
-rw-r--r--tests/wpt/metadata/encoding/single-byte-decoder.html.ini45
-rw-r--r--tests/wpt/metadata/html/browsers/history/the-history-interface/traverse_the_history_4.html.ini (renamed from tests/wpt/metadata/html/browsers/history/the-history-interface/traverse_the_history_5.html.ini)2
-rw-r--r--tests/wpt/metadata/html/semantics/embedded-content/the-img-element/environment-changes/viewport-change.html.ini11
-rw-r--r--tests/wpt/metadata/html/semantics/embedded-content/the-img-element/sizes/sizes-dynamic-002.html.ini2
-rw-r--r--tests/wpt/metadata/html/semantics/interactive-elements/the-details-element/toggleEvent.html.ini7
-rw-r--r--tests/wpt/metadata/html/webappapis/scripting/processing-model-2/unhandled-promise-rejections/promise-rejection-events.html.ini5
-rw-r--r--tests/wpt/metadata/workers/semantics/multiple-workers/005.html.ini1
-rw-r--r--tests/wpt/mozilla/meta/mozilla/paint_timing.html.ini4
-rw-r--r--tests/wpt/web-platform-tests/.azure-pipelines.yml31
-rw-r--r--tests/wpt/web-platform-tests/2dcontext/drawing-images-to-the-canvas/drawimage_svg_image_with_foreign_object_does_not_taint.html32
-rw-r--r--tests/wpt/web-platform-tests/bluetooth/META.yml5
-rw-r--r--tests/wpt/web-platform-tests/css/compositing/inheritance.html23
-rw-r--r--tests/wpt/web-platform-tests/css/css-backgrounds/background-image-centered-with-border-radius.html24
-rw-r--r--tests/wpt/web-platform-tests/css/css-backgrounds/background-image-first-line.html19
-rw-r--r--tests/wpt/web-platform-tests/css/css-backgrounds/reference/background-image-centered-with-border-radius-ref.html22
-rw-r--r--tests/wpt/web-platform-tests/css/css-backgrounds/reference/background-image-first-line-ref.html12
-rw-r--r--tests/wpt/web-platform-tests/css/css-backgrounds/support/green-60x60-red-5px-border.pngbin0 -> 225 bytes
-rw-r--r--tests/wpt/web-platform-tests/encoding/encodeInto.any.js144
-rw-r--r--tests/wpt/web-platform-tests/fetch/api/abort/general.any.js2
-rw-r--r--tests/wpt/web-platform-tests/html/semantics/embedded-content/the-img-element/sizes/sizes-dynamic-002.html33
-rw-r--r--tests/wpt/web-platform-tests/interfaces/webxr.idl9
-rw-r--r--tests/wpt/web-platform-tests/mediacapture-record/MediaRecorder-disabled-tracks.https.html53
-rwxr-xr-xtests/wpt/web-platform-tests/referrer-policy/generic/tools/generate.py25
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/a-tag/no-redirect/same-origin-downgrade.http.html40
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/same-origin-downgrade.http.html40
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/no-redirect/same-origin-downgrade.http.html40
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-downgrade.http.html40
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-upgrade.http.html40
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/keep-origin-redirect/same-origin-downgrade.http.html40
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/no-redirect/same-origin-downgrade.http.html40
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-downgrade.http.html40
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-upgrade.http.html40
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/script-tag/keep-origin-redirect/same-origin-downgrade.http.html40
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/script-tag/no-redirect/same-origin-downgrade.http.html40
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-downgrade.http.html40
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-upgrade.http.html40
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/a-tag/no-redirect/same-origin-downgrade.http.html41
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/a-tag/no-redirect/same-origin-downgrade.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/same-origin-downgrade.http.html41
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/same-origin-downgrade.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/no-redirect/same-origin-downgrade.http.html41
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/no-redirect/same-origin-downgrade.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-downgrade.http.html41
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-downgrade.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-upgrade.http.html41
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-upgrade.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/same-origin-downgrade.http.html41
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/same-origin-downgrade.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/no-redirect/same-origin-downgrade.http.html41
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/no-redirect/same-origin-downgrade.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-downgrade.http.html41
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-downgrade.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-upgrade.http.html41
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-upgrade.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/same-origin-downgrade.http.html41
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/same-origin-downgrade.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/no-redirect/same-origin-downgrade.http.html41
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/no-redirect/same-origin-downgrade.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-downgrade.http.html41
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-downgrade.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-upgrade.http.html41
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-upgrade.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/same-origin-downgrade.http.html41
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/same-origin-downgrade.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/no-redirect/same-origin-downgrade.http.html41
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/no-redirect/same-origin-downgrade.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-downgrade.http.html41
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-downgrade.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-upgrade.http.html41
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-upgrade.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/same-origin-downgrade.http.html41
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/same-origin-downgrade.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/no-redirect/same-origin-downgrade.http.html41
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/no-redirect/same-origin-downgrade.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-downgrade.http.html41
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-downgrade.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-upgrade.http.html41
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-upgrade.http.html.headers2
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/a-tag/no-redirect/same-origin-downgrade.http.html41
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/keep-origin-redirect/same-origin-downgrade.http.html41
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/no-redirect/same-origin-downgrade.http.html41
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-downgrade.http.html41
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-upgrade.http.html41
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/same-origin-downgrade.http.html41
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/no-redirect/same-origin-downgrade.http.html41
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-downgrade.http.html41
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-upgrade.http.html41
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/keep-origin-redirect/same-origin-downgrade.http.html41
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/no-redirect/same-origin-downgrade.http.html41
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-downgrade.http.html41
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-upgrade.http.html41
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/keep-origin-redirect/same-origin-downgrade.http.html41
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/no-redirect/same-origin-downgrade.http.html41
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-downgrade.http.html41
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-upgrade.http.html41
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/keep-origin-redirect/same-origin-downgrade.http.html41
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/no-redirect/same-origin-downgrade.http.html41
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-downgrade.http.html41
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-upgrade.http.html41
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/spec.src.json4
-rw-r--r--tests/wpt/web-platform-tests/referrer-policy/spec_json.js2
-rw-r--r--tests/wpt/web-platform-tests/shadow-dom/offsetParent-across-shadow-boundaries.html190
-rw-r--r--tests/wpt/web-platform-tests/signed-exchange/check-cert-request.tentative.html17
-rw-r--r--tests/wpt/web-platform-tests/signed-exchange/resources/check-cert-request.py11
-rw-r--r--tests/wpt/web-platform-tests/signed-exchange/resources/check-cert-request.sxgbin0 -> 956 bytes
-rw-r--r--tests/wpt/web-platform-tests/signed-exchange/resources/check-cert-request.sxg.headers2
-rwxr-xr-xtests/wpt/web-platform-tests/signed-exchange/resources/generate-test-sxgs.sh31
-rw-r--r--tests/wpt/web-platform-tests/signed-exchange/resources/sxg-noncacheable.sxgbin0 -> 980 bytes
-rw-r--r--tests/wpt/web-platform-tests/signed-exchange/resources/sxg-noncacheable.sxg.headers2
-rw-r--r--tests/wpt/web-platform-tests/signed-exchange/sxg-noncacheable.tentative.html17
-rw-r--r--tests/wpt/web-platform-tests/tools/wptrunner/wptrunner/executors/executormarionette.py5
-rw-r--r--tests/wpt/web-platform-tests/upgrade-insecure-requests/support/testharness-helper.sub.js2
-rw-r--r--tests/wpt/web-platform-tests/web-animations/animation-model/animation-types/property-types.js2
-rw-r--r--tests/wpt/web-platform-tests/webrtc/RTCDtlsTransport-state.html63
120 files changed, 1205 insertions, 3165 deletions
diff --git a/tests/wpt/metadata/2dcontext/drawing-images-to-the-canvas/drawimage_svg_image_with_foreign_object_does_not_taint.html.ini b/tests/wpt/metadata/2dcontext/drawing-images-to-the-canvas/drawimage_svg_image_with_foreign_object_does_not_taint.html.ini
new file mode 100644
index 00000000000..0d351bdbe2e
--- /dev/null
+++ b/tests/wpt/metadata/2dcontext/drawing-images-to-the-canvas/drawimage_svg_image_with_foreign_object_does_not_taint.html.ini
@@ -0,0 +1,5 @@
+[drawimage_svg_image_with_foreign_object_does_not_taint.html]
+ expected: TIMEOUT
+ [Canvas should not be tainted after drawing SVG including <foreignObject>]
+ expected: TIMEOUT
+
diff --git a/tests/wpt/metadata/MANIFEST.json b/tests/wpt/metadata/MANIFEST.json
index 75607289d83..e5e42757c16 100644
--- a/tests/wpt/metadata/MANIFEST.json
+++ b/tests/wpt/metadata/MANIFEST.json
@@ -104479,48 +104479,48 @@
{}
]
],
- "css/css-backgrounds/background-image-centered.html": [
+ "css/css-backgrounds/background-image-centered-with-border-radius.html": [
[
- "/css/css-backgrounds/background-image-centered.html",
+ "/css/css-backgrounds/background-image-centered-with-border-radius.html",
[
[
- "/css/css-backgrounds/background-image-centered-ref.html",
+ "/css/css-backgrounds/reference/background-image-centered-with-border-radius-ref.html",
"=="
]
],
{}
]
],
- "css/css-backgrounds/background-image-cover-zoomed-1.html": [
+ "css/css-backgrounds/background-image-centered.html": [
[
- "/css/css-backgrounds/background-image-cover-zoomed-1.html",
+ "/css/css-backgrounds/background-image-centered.html",
[
[
- "/css/css-backgrounds/reference/background-image-cover-zoomed-1-ref.html",
+ "/css/css-backgrounds/background-image-centered-ref.html",
"=="
]
],
{}
]
],
- "css/css-backgrounds/background-image-first-letter.html": [
+ "css/css-backgrounds/background-image-cover-zoomed-1.html": [
[
- "/css/css-backgrounds/background-image-first-letter.html",
+ "/css/css-backgrounds/background-image-cover-zoomed-1.html",
[
[
- "/css/css-backgrounds/reference/background-image-first-letter-ref.html",
+ "/css/css-backgrounds/reference/background-image-cover-zoomed-1-ref.html",
"=="
]
],
{}
]
],
- "css/css-backgrounds/background-image-first-line.html": [
+ "css/css-backgrounds/background-image-first-letter.html": [
[
- "/css/css-backgrounds/background-image-first-line.html",
+ "/css/css-backgrounds/background-image-first-letter.html",
[
[
- "/css/css-backgrounds/reference/background-image-first-line-ref.html",
+ "/css/css-backgrounds/reference/background-image-first-letter-ref.html",
"=="
]
],
@@ -192123,6 +192123,18 @@
{}
]
],
+ "html/semantics/embedded-content/the-img-element/sizes/sizes-dynamic-002.html": [
+ [
+ "/html/semantics/embedded-content/the-img-element/sizes/sizes-dynamic-002.html",
+ [
+ [
+ "/html/semantics/embedded-content/the-img-element/sizes/sizes-dynamic-001-ref.html",
+ "=="
+ ]
+ ],
+ {}
+ ]
+ ],
"html/semantics/embedded-content/the-video-element/video_content_image.htm": [
[
"/html/semantics/embedded-content/the-video-element/video_content_image.htm",
@@ -253238,17 +253250,17 @@
{}
]
],
- "css/css-backgrounds/reference/background-image-cover-zoomed-1-ref.html": [
+ "css/css-backgrounds/reference/background-image-centered-with-border-radius-ref.html": [
[
{}
]
],
- "css/css-backgrounds/reference/background-image-first-letter-ref.html": [
+ "css/css-backgrounds/reference/background-image-cover-zoomed-1-ref.html": [
[
{}
]
],
- "css/css-backgrounds/reference/background-image-first-line-ref.html": [
+ "css/css-backgrounds/reference/background-image-first-letter-ref.html": [
[
{}
]
@@ -253673,6 +253685,11 @@
{}
]
],
+ "css/css-backgrounds/support/green-60x60-red-5px-border.png": [
+ [
+ {}
+ ]
+ ],
"css/css-backgrounds/support/green.png": [
[
{}
@@ -305188,191 +305205,86 @@
{}
]
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/a-tag/no-redirect/same-origin-downgrade.http.html.headers": [
- [
- {}
- ]
- ],
"referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/a-tag/no-redirect/same-origin-upgrade.http.html.headers": [
[
{}
]
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/same-origin-downgrade.http.html.headers": [
- [
- {}
- ]
- ],
"referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/same-origin-upgrade.http.html.headers": [
[
{}
]
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/no-redirect/same-origin-downgrade.http.html.headers": [
- [
- {}
- ]
- ],
"referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/no-redirect/same-origin-upgrade.http.html.headers": [
[
{}
]
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-downgrade.http.html.headers": [
- [
- {}
- ]
- ],
"referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-insecure.http.html.headers": [
[
{}
]
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-upgrade.http.html.headers": [
- [
- {}
- ]
- ],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/same-origin-downgrade.http.html.headers": [
- [
- {}
- ]
- ],
"referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/same-origin-upgrade.http.html.headers": [
[
{}
]
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/no-redirect/same-origin-downgrade.http.html.headers": [
- [
- {}
- ]
- ],
"referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/no-redirect/same-origin-upgrade.http.html.headers": [
[
{}
]
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-downgrade.http.html.headers": [
- [
- {}
- ]
- ],
"referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-insecure.http.html.headers": [
[
{}
]
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-upgrade.http.html.headers": [
- [
- {}
- ]
- ],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/same-origin-downgrade.http.html.headers": [
- [
- {}
- ]
- ],
"referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/same-origin-upgrade.http.html.headers": [
[
{}
]
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/no-redirect/same-origin-downgrade.http.html.headers": [
- [
- {}
- ]
- ],
"referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/no-redirect/same-origin-upgrade.http.html.headers": [
[
{}
]
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-downgrade.http.html.headers": [
- [
- {}
- ]
- ],
"referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-insecure.http.html.headers": [
[
{}
]
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-upgrade.http.html.headers": [
- [
- {}
- ]
- ],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/same-origin-downgrade.http.html.headers": [
- [
- {}
- ]
- ],
"referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/same-origin-upgrade.http.html.headers": [
[
{}
]
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/no-redirect/same-origin-downgrade.http.html.headers": [
- [
- {}
- ]
- ],
"referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/no-redirect/same-origin-upgrade.http.html.headers": [
[
{}
]
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-downgrade.http.html.headers": [
- [
- {}
- ]
- ],
"referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-insecure.http.html.headers": [
[
{}
]
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-upgrade.http.html.headers": [
- [
- {}
- ]
- ],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/same-origin-downgrade.http.html.headers": [
- [
- {}
- ]
- ],
"referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/same-origin-upgrade.http.html.headers": [
[
{}
]
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/no-redirect/same-origin-downgrade.http.html.headers": [
- [
- {}
- ]
- ],
"referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/no-redirect/same-origin-upgrade.http.html.headers": [
[
{}
]
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-downgrade.http.html.headers": [
- [
- {}
- ]
- ],
"referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-insecure.http.html.headers": [
[
{}
]
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-upgrade.http.html.headers": [
- [
- {}
- ]
- ],
"referrer-policy/origin/http-rp/cross-origin/http-http/a-tag/no-redirect/generic.http.html.headers": [
[
{}
@@ -312003,6 +311915,21 @@
{}
]
],
+ "signed-exchange/resources/check-cert-request.py": [
+ [
+ {}
+ ]
+ ],
+ "signed-exchange/resources/check-cert-request.sxg": [
+ [
+ {}
+ ]
+ ],
+ "signed-exchange/resources/check-cert-request.sxg.headers": [
+ [
+ {}
+ ]
+ ],
"signed-exchange/resources/failure.html": [
[
{}
@@ -312098,6 +312025,16 @@
{}
]
],
+ "signed-exchange/resources/sxg-noncacheable.sxg": [
+ [
+ {}
+ ]
+ ],
+ "signed-exchange/resources/sxg-noncacheable.sxg.headers": [
+ [
+ {}
+ ]
+ ],
"signed-exchange/resources/sxg-utf8-inner-url.sxg": [
[
{}
@@ -327051,6 +326988,12 @@
{}
]
],
+ "2dcontext/drawing-images-to-the-canvas/drawimage_svg_image_with_foreign_object_does_not_taint.html": [
+ [
+ "/2dcontext/drawing-images-to-the-canvas/drawimage_svg_image_with_foreign_object_does_not_taint.html",
+ {}
+ ]
+ ],
"2dcontext/drawing-paths-to-the-canvas/canvas_complexshapes_ispointInpath_001.htm": [
[
"/2dcontext/drawing-paths-to-the-canvas/canvas_complexshapes_ispointInpath_001.htm",
@@ -340101,6 +340044,12 @@
{}
]
],
+ "css/compositing/inheritance.html": [
+ [
+ "/css/compositing/inheritance.html",
+ {}
+ ]
+ ],
"css/compositing/mix-blend-mode/mix-blend-mode-creates-stacking-context.html": [
[
"/css/compositing/mix-blend-mode/mix-blend-mode-creates-stacking-context.html",
@@ -356781,6 +356730,16 @@
{}
]
],
+ "encoding/encodeInto.any.js": [
+ [
+ "/encoding/encodeInto.any.html",
+ {}
+ ],
+ [
+ "/encoding/encodeInto.any.worker.html",
+ {}
+ ]
+ ],
"encoding/gb18030-encoder.html": [
[
"/encoding/gb18030-encoder.html",
@@ -383073,6 +383032,12 @@
{}
]
],
+ "mediacapture-record/MediaRecorder-disabled-tracks.https.html": [
+ [
+ "/mediacapture-record/MediaRecorder-disabled-tracks.https.html",
+ {}
+ ]
+ ],
"mediacapture-record/MediaRecorder-error.html": [
[
"/mediacapture-record/MediaRecorder-error.html",
@@ -399881,144 +399846,66 @@
{}
]
],
- "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/a-tag/no-redirect/same-origin-downgrade.http.html": [
- [
- "/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/a-tag/no-redirect/same-origin-downgrade.http.html",
- {}
- ]
- ],
"referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/a-tag/no-redirect/same-origin-upgrade.http.html": [
[
"/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/a-tag/no-redirect/same-origin-upgrade.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/same-origin-downgrade.http.html": [
- [
- "/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/same-origin-downgrade.http.html",
- {}
- ]
- ],
"referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/same-origin-upgrade.http.html": [
[
"/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/same-origin-upgrade.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/no-redirect/same-origin-downgrade.http.html": [
- [
- "/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/no-redirect/same-origin-downgrade.http.html",
- {}
- ]
- ],
"referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/no-redirect/same-origin-upgrade.http.html": [
[
"/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/no-redirect/same-origin-upgrade.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-downgrade.http.html": [
- [
- "/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-downgrade.http.html",
- {}
- ]
- ],
"referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-insecure.http.html": [
[
"/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-insecure.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-upgrade.http.html": [
- [
- "/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-upgrade.http.html",
- {}
- ]
- ],
- "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/keep-origin-redirect/same-origin-downgrade.http.html": [
- [
- "/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/keep-origin-redirect/same-origin-downgrade.http.html",
- {}
- ]
- ],
"referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/keep-origin-redirect/same-origin-upgrade.http.html": [
[
"/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/keep-origin-redirect/same-origin-upgrade.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/no-redirect/same-origin-downgrade.http.html": [
- [
- "/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/no-redirect/same-origin-downgrade.http.html",
- {}
- ]
- ],
"referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/no-redirect/same-origin-upgrade.http.html": [
[
"/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/no-redirect/same-origin-upgrade.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-downgrade.http.html": [
- [
- "/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-downgrade.http.html",
- {}
- ]
- ],
"referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-insecure.http.html": [
[
"/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-insecure.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-upgrade.http.html": [
- [
- "/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-upgrade.http.html",
- {}
- ]
- ],
- "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/script-tag/keep-origin-redirect/same-origin-downgrade.http.html": [
- [
- "/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/script-tag/keep-origin-redirect/same-origin-downgrade.http.html",
- {}
- ]
- ],
"referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/script-tag/keep-origin-redirect/same-origin-upgrade.http.html": [
[
"/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/script-tag/keep-origin-redirect/same-origin-upgrade.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/script-tag/no-redirect/same-origin-downgrade.http.html": [
- [
- "/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/script-tag/no-redirect/same-origin-downgrade.http.html",
- {}
- ]
- ],
"referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/script-tag/no-redirect/same-origin-upgrade.http.html": [
[
"/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/script-tag/no-redirect/same-origin-upgrade.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-downgrade.http.html": [
- [
- "/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-downgrade.http.html",
- {}
- ]
- ],
"referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-insecure.http.html": [
[
"/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-insecure.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-upgrade.http.html": [
- [
- "/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-upgrade.http.html",
- {}
- ]
- ],
"referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/a-tag/no-redirect/cross-origin.http.html": [
[
"/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/a-tag/no-redirect/cross-origin.http.html",
@@ -400343,228 +400230,102 @@
{}
]
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/a-tag/no-redirect/same-origin-downgrade.http.html": [
- [
- "/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/a-tag/no-redirect/same-origin-downgrade.http.html",
- {}
- ]
- ],
"referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/a-tag/no-redirect/same-origin-upgrade.http.html": [
[
"/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/a-tag/no-redirect/same-origin-upgrade.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/same-origin-downgrade.http.html": [
- [
- "/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/same-origin-downgrade.http.html",
- {}
- ]
- ],
"referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/same-origin-upgrade.http.html": [
[
"/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/same-origin-upgrade.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/no-redirect/same-origin-downgrade.http.html": [
- [
- "/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/no-redirect/same-origin-downgrade.http.html",
- {}
- ]
- ],
"referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/no-redirect/same-origin-upgrade.http.html": [
[
"/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/no-redirect/same-origin-upgrade.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-downgrade.http.html": [
- [
- "/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-downgrade.http.html",
- {}
- ]
- ],
"referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-insecure.http.html": [
[
"/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-insecure.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-upgrade.http.html": [
- [
- "/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-upgrade.http.html",
- {}
- ]
- ],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/same-origin-downgrade.http.html": [
- [
- "/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/same-origin-downgrade.http.html",
- {}
- ]
- ],
"referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/same-origin-upgrade.http.html": [
[
"/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/same-origin-upgrade.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/no-redirect/same-origin-downgrade.http.html": [
- [
- "/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/no-redirect/same-origin-downgrade.http.html",
- {}
- ]
- ],
"referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/no-redirect/same-origin-upgrade.http.html": [
[
"/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/no-redirect/same-origin-upgrade.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-downgrade.http.html": [
- [
- "/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-downgrade.http.html",
- {}
- ]
- ],
"referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-insecure.http.html": [
[
"/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-insecure.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-upgrade.http.html": [
- [
- "/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-upgrade.http.html",
- {}
- ]
- ],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/same-origin-downgrade.http.html": [
- [
- "/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/same-origin-downgrade.http.html",
- {}
- ]
- ],
"referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/same-origin-upgrade.http.html": [
[
"/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/same-origin-upgrade.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/no-redirect/same-origin-downgrade.http.html": [
- [
- "/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/no-redirect/same-origin-downgrade.http.html",
- {}
- ]
- ],
"referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/no-redirect/same-origin-upgrade.http.html": [
[
"/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/no-redirect/same-origin-upgrade.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-downgrade.http.html": [
- [
- "/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-downgrade.http.html",
- {}
- ]
- ],
"referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-insecure.http.html": [
[
"/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-insecure.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-upgrade.http.html": [
- [
- "/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-upgrade.http.html",
- {}
- ]
- ],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/same-origin-downgrade.http.html": [
- [
- "/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/same-origin-downgrade.http.html",
- {}
- ]
- ],
"referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/same-origin-upgrade.http.html": [
[
"/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/same-origin-upgrade.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/no-redirect/same-origin-downgrade.http.html": [
- [
- "/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/no-redirect/same-origin-downgrade.http.html",
- {}
- ]
- ],
"referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/no-redirect/same-origin-upgrade.http.html": [
[
"/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/no-redirect/same-origin-upgrade.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-downgrade.http.html": [
- [
- "/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-downgrade.http.html",
- {}
- ]
- ],
"referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-insecure.http.html": [
[
"/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-insecure.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-upgrade.http.html": [
- [
- "/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-upgrade.http.html",
- {}
- ]
- ],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/same-origin-downgrade.http.html": [
- [
- "/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/same-origin-downgrade.http.html",
- {}
- ]
- ],
"referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/same-origin-upgrade.http.html": [
[
"/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/same-origin-upgrade.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/no-redirect/same-origin-downgrade.http.html": [
- [
- "/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/no-redirect/same-origin-downgrade.http.html",
- {}
- ]
- ],
"referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/no-redirect/same-origin-upgrade.http.html": [
[
"/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/no-redirect/same-origin-upgrade.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-downgrade.http.html": [
- [
- "/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-downgrade.http.html",
- {}
- ]
- ],
"referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-insecure.http.html": [
[
"/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-insecure.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-upgrade.http.html": [
- [
- "/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-upgrade.http.html",
- {}
- ]
- ],
"referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/a-tag/no-redirect/cross-origin.http.html": [
[
"/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/a-tag/no-redirect/cross-origin.http.html",
@@ -400889,228 +400650,102 @@
{}
]
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/a-tag/no-redirect/same-origin-downgrade.http.html": [
- [
- "/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/a-tag/no-redirect/same-origin-downgrade.http.html",
- {}
- ]
- ],
"referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/a-tag/no-redirect/same-origin-upgrade.http.html": [
[
"/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/a-tag/no-redirect/same-origin-upgrade.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/keep-origin-redirect/same-origin-downgrade.http.html": [
- [
- "/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/keep-origin-redirect/same-origin-downgrade.http.html",
- {}
- ]
- ],
"referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/keep-origin-redirect/same-origin-upgrade.http.html": [
[
"/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/keep-origin-redirect/same-origin-upgrade.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/no-redirect/same-origin-downgrade.http.html": [
- [
- "/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/no-redirect/same-origin-downgrade.http.html",
- {}
- ]
- ],
"referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/no-redirect/same-origin-upgrade.http.html": [
[
"/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/no-redirect/same-origin-upgrade.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-downgrade.http.html": [
- [
- "/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-downgrade.http.html",
- {}
- ]
- ],
"referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-insecure.http.html": [
[
"/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-insecure.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-upgrade.http.html": [
- [
- "/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-upgrade.http.html",
- {}
- ]
- ],
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/same-origin-downgrade.http.html": [
- [
- "/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/same-origin-downgrade.http.html",
- {}
- ]
- ],
"referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/same-origin-upgrade.http.html": [
[
"/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/same-origin-upgrade.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/no-redirect/same-origin-downgrade.http.html": [
- [
- "/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/no-redirect/same-origin-downgrade.http.html",
- {}
- ]
- ],
"referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/no-redirect/same-origin-upgrade.http.html": [
[
"/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/no-redirect/same-origin-upgrade.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-downgrade.http.html": [
- [
- "/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-downgrade.http.html",
- {}
- ]
- ],
"referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-insecure.http.html": [
[
"/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-insecure.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-upgrade.http.html": [
- [
- "/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-upgrade.http.html",
- {}
- ]
- ],
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/keep-origin-redirect/same-origin-downgrade.http.html": [
- [
- "/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/keep-origin-redirect/same-origin-downgrade.http.html",
- {}
- ]
- ],
"referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/keep-origin-redirect/same-origin-upgrade.http.html": [
[
"/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/keep-origin-redirect/same-origin-upgrade.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/no-redirect/same-origin-downgrade.http.html": [
- [
- "/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/no-redirect/same-origin-downgrade.http.html",
- {}
- ]
- ],
"referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/no-redirect/same-origin-upgrade.http.html": [
[
"/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/no-redirect/same-origin-upgrade.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-downgrade.http.html": [
- [
- "/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-downgrade.http.html",
- {}
- ]
- ],
"referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-insecure.http.html": [
[
"/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-insecure.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-upgrade.http.html": [
- [
- "/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-upgrade.http.html",
- {}
- ]
- ],
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/keep-origin-redirect/same-origin-downgrade.http.html": [
- [
- "/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/keep-origin-redirect/same-origin-downgrade.http.html",
- {}
- ]
- ],
"referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/keep-origin-redirect/same-origin-upgrade.http.html": [
[
"/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/keep-origin-redirect/same-origin-upgrade.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/no-redirect/same-origin-downgrade.http.html": [
- [
- "/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/no-redirect/same-origin-downgrade.http.html",
- {}
- ]
- ],
"referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/no-redirect/same-origin-upgrade.http.html": [
[
"/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/no-redirect/same-origin-upgrade.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-downgrade.http.html": [
- [
- "/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-downgrade.http.html",
- {}
- ]
- ],
"referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-insecure.http.html": [
[
"/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-insecure.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-upgrade.http.html": [
- [
- "/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-upgrade.http.html",
- {}
- ]
- ],
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/keep-origin-redirect/same-origin-downgrade.http.html": [
- [
- "/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/keep-origin-redirect/same-origin-downgrade.http.html",
- {}
- ]
- ],
"referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/keep-origin-redirect/same-origin-upgrade.http.html": [
[
"/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/keep-origin-redirect/same-origin-upgrade.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/no-redirect/same-origin-downgrade.http.html": [
- [
- "/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/no-redirect/same-origin-downgrade.http.html",
- {}
- ]
- ],
"referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/no-redirect/same-origin-upgrade.http.html": [
[
"/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/no-redirect/same-origin-upgrade.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-downgrade.http.html": [
- [
- "/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-downgrade.http.html",
- {}
- ]
- ],
"referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-insecure.http.html": [
[
"/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-insecure.http.html",
{}
]
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-upgrade.http.html": [
- [
- "/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-upgrade.http.html",
- {}
- ]
- ],
"referrer-policy/origin/attr-referrer/cross-origin/http-http/a-tag/no-redirect/generic.http.html": [
[
"/referrer-policy/origin/attr-referrer/cross-origin/http-http/a-tag/no-redirect/generic.http.html",
@@ -410057,6 +409692,12 @@
{}
]
],
+ "shadow-dom/offsetParent-across-shadow-boundaries.html": [
+ [
+ "/shadow-dom/offsetParent-across-shadow-boundaries.html",
+ {}
+ ]
+ ],
"shadow-dom/scroll-to-the-fragment-in-shadow-tree.html": [
[
"/shadow-dom/scroll-to-the-fragment-in-shadow-tree.html",
@@ -410439,6 +410080,12 @@
{}
]
],
+ "signed-exchange/check-cert-request.tentative.html": [
+ [
+ "/signed-exchange/check-cert-request.tentative.html",
+ {}
+ ]
+ ],
"signed-exchange/fallback-to-another-sxg.tentative.html": [
[
"/signed-exchange/fallback-to-another-sxg.tentative.html",
@@ -410505,6 +410152,12 @@
{}
]
],
+ "signed-exchange/sxg-noncacheable.tentative.html": [
+ [
+ "/signed-exchange/sxg-noncacheable.tentative.html",
+ {}
+ ]
+ ],
"signed-exchange/sxg-prefetch-resource-timing.tentative.html": [
[
"/signed-exchange/sxg-prefetch-resource-timing.tentative.html",
@@ -445417,7 +445070,7 @@
},
"paths": {
".azure-pipelines.yml": [
- "9ddcd25654bdc67bbafd6c11f10a39dc030bdbfb",
+ "773ff6cc5f9f42a0585b6db38a53d0bb1cc6297e",
"support"
],
".codecov.yml": [
@@ -446336,6 +445989,10 @@
"6208b8dc05629208ee3d68b233e1b6c107d1d12b",
"testharness"
],
+ "2dcontext/drawing-images-to-the-canvas/drawimage_svg_image_with_foreign_object_does_not_taint.html": [
+ "f29b2bf5a8a7eb45c22306faaf5028428e28cf9b",
+ "testharness"
+ ],
"2dcontext/drawing-paths-to-the-canvas/canvas_complexshapes_ispointInpath_001.htm": [
"18c3c9afb9506d4fa9214b091cd4aeb74ce26f9b",
"testharness"
@@ -455653,7 +455310,7 @@
"support"
],
"bluetooth/META.yml": [
- "c93f16a3a5f41ff248b0c7cb4fa23e1844af21da",
+ "501396bac744058ef594b19a935732ba0f277219",
"support"
],
"bluetooth/README.md": [
@@ -539104,6 +538761,10 @@
"44f138b5a6e1bb0d92206a5e0777de98f641fec0",
"reftest"
],
+ "css/compositing/inheritance.html": [
+ "8bd08672edf54d3e6478841af7714235afb7bfab",
+ "testharness"
+ ],
"css/compositing/isolation/blend-isolation.html": [
"d1aa412ecf1b970a271f8ed0919c378ab9ec5fdb",
"visual"
@@ -540724,6 +540385,10 @@
"f52cd963ad25238bafc2081b7024aa5375614f5a",
"support"
],
+ "css/css-backgrounds/background-image-centered-with-border-radius.html": [
+ "602cd48aaa9bdb9d5c126577638b00ab81e8f93d",
+ "reftest"
+ ],
"css/css-backgrounds/background-image-centered.html": [
"7051aa359c8cdf427a6c1b63179baad26c5a1645",
"reftest"
@@ -540736,10 +540401,6 @@
"f78460b90708223616a019aa48aaaa4fe8b2ce43",
"reftest"
],
- "css/css-backgrounds/background-image-first-line.html": [
- "c8dee7050b6241279d5f462263b9fdead50004fc",
- "reftest"
- ],
"css/css-backgrounds/background-image-none-gradient-repaint.html": [
"3f39fb8d850d7561703f791135ea7dd4b3aa9fe8",
"reftest"
@@ -543312,6 +542973,10 @@
"f8b2ad25ccdc743e638d402590141296c142e602",
"support"
],
+ "css/css-backgrounds/reference/background-image-centered-with-border-radius-ref.html": [
+ "44db3f56017f3408dc750ac48b07c644d0f05db2",
+ "support"
+ ],
"css/css-backgrounds/reference/background-image-cover-zoomed-1-ref.html": [
"d61bac9feddf1013aa2db92cba8d258a523de446",
"support"
@@ -543320,10 +542985,6 @@
"304be71fbace6a964566e2a24dc8ab802cdec7e3",
"support"
],
- "css/css-backgrounds/reference/background-image-first-line-ref.html": [
- "82fd9a2d3d0e3c886835168283ec3f32270c0356",
- "support"
- ],
"css/css-backgrounds/reference/background-origin-002-ref.html": [
"88d61225a623d112e5f54505899a21dd4d929a5b",
"support"
@@ -543664,6 +543325,10 @@
"b061c1f33f7d3a5d4e917c42d7efe23ec10eb6e0",
"support"
],
+ "css/css-backgrounds/support/green-60x60-red-5px-border.png": [
+ "97a94592dd597b75d164592f54d5db2d2023011c",
+ "support"
+ ],
"css/css-backgrounds/support/green.png": [
"5c5217b1e7b27ef88f06cf3ced87f5e115eadbe6",
"support"
@@ -611224,6 +610889,10 @@
"7260b6b155b13de3961d170c3e2868042e229305",
"testharness"
],
+ "encoding/encodeInto.any.js": [
+ "2abc69744d7018a80f61022c6aa9a8225d050b6c",
+ "testharness"
+ ],
"encoding/eof-shift_jis-ref.html": [
"b90f8032a31db260902c2c04b671b30ee9c62c8e",
"support"
@@ -614345,7 +614014,7 @@
"testharness"
],
"fetch/api/abort/general.any.js": [
- "11999cc92700aebd8a94c6d279d8e21c474ee2b2",
+ "d6159c7e1b0261796bf553b39b3c6a0cc5a1842b",
"testharness"
],
"fetch/api/abort/keepalive.html": [
@@ -629764,6 +629433,10 @@
"51f8145bf97958af3950b0f33061488274c03d60",
"reftest"
],
+ "html/semantics/embedded-content/the-img-element/sizes/sizes-dynamic-002.html": [
+ "6c64b3da39200c51902ecdf7352d62df2704e576",
+ "reftest"
+ ],
"html/semantics/embedded-content/the-img-element/sizes/support/parse-a-sizes-attribute.js": [
"62ad00a4682b269e52797f6e2ee8e46bf44d56ac",
"support"
@@ -637001,7 +636674,7 @@
"support"
],
"interfaces/webxr.idl": [
- "ea45aef97715ec7d4e098e357af69575eb432ebd",
+ "3054500f5903f72214b4bd8984488a186b2a5d8a",
"support"
],
"interfaces/worklets.idl": [
@@ -638688,6 +638361,10 @@
"1710d238b6e31d285766f25f4625d206d1d8a1fc",
"testharness"
],
+ "mediacapture-record/MediaRecorder-disabled-tracks.https.html": [
+ "fe26e0c9616a58c2c884e66eaf721e67709f09d5",
+ "testharness"
+ ],
"mediacapture-record/MediaRecorder-error.html": [
"2459449acf931cd38301fca11e7b15326afac040",
"testharness"
@@ -650781,7 +650458,7 @@
"support"
],
"referrer-policy/generic/tools/generate.py": [
- "30e5b6142f94b74fd961cfc376e7aa1cc0d39f00",
+ "84aa9feab424d062a05f9a00b914760a1f788dbf",
"support"
],
"referrer-policy/generic/tools/regenerate": [
@@ -652916,98 +652593,46 @@
"46c715d6aa2fab2b6345ece4d0ce38d65249e2ec",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/a-tag/no-redirect/same-origin-downgrade.http.html": [
- "12903c4da403b797c832766934299f2b30a88740",
- "testharness"
- ],
"referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/a-tag/no-redirect/same-origin-upgrade.http.html": [
"12903c4da403b797c832766934299f2b30a88740",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/same-origin-downgrade.http.html": [
- "ca0b0b1b5f564ae84b27ec1936877748dbdde05e",
- "testharness"
- ],
"referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/same-origin-upgrade.http.html": [
"ca0b0b1b5f564ae84b27ec1936877748dbdde05e",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/no-redirect/same-origin-downgrade.http.html": [
- "19cf59322f7b43bce60f590bbad7f676316118fd",
- "testharness"
- ],
"referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/no-redirect/same-origin-upgrade.http.html": [
"19cf59322f7b43bce60f590bbad7f676316118fd",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-downgrade.http.html": [
- "77452623c86210bec379fff66b51d97eed4a4c6d",
- "testharness"
- ],
"referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-insecure.http.html": [
"77452623c86210bec379fff66b51d97eed4a4c6d",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-upgrade.http.html": [
- "77452623c86210bec379fff66b51d97eed4a4c6d",
- "testharness"
- ],
- "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/keep-origin-redirect/same-origin-downgrade.http.html": [
- "f0c9e6fd969c134b09205085ba9e6d6c60a8af01",
- "testharness"
- ],
"referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/keep-origin-redirect/same-origin-upgrade.http.html": [
"f0c9e6fd969c134b09205085ba9e6d6c60a8af01",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/no-redirect/same-origin-downgrade.http.html": [
- "2aed178fd08aa081f22be120bd1db62e04d05476",
- "testharness"
- ],
"referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/no-redirect/same-origin-upgrade.http.html": [
"2aed178fd08aa081f22be120bd1db62e04d05476",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-downgrade.http.html": [
- "4e184519eb8b6f4cda6380dd8a4be8edd5311ac3",
- "testharness"
- ],
"referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-insecure.http.html": [
"4e184519eb8b6f4cda6380dd8a4be8edd5311ac3",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-upgrade.http.html": [
- "4e184519eb8b6f4cda6380dd8a4be8edd5311ac3",
- "testharness"
- ],
- "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/script-tag/keep-origin-redirect/same-origin-downgrade.http.html": [
- "9063bbd5ee5091664415dd6b9024c2d2397f4f8a",
- "testharness"
- ],
"referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/script-tag/keep-origin-redirect/same-origin-upgrade.http.html": [
"9063bbd5ee5091664415dd6b9024c2d2397f4f8a",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/script-tag/no-redirect/same-origin-downgrade.http.html": [
- "56bc742d64d4661438e07d31cd7884b72c711c65",
- "testharness"
- ],
"referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/script-tag/no-redirect/same-origin-upgrade.http.html": [
"56bc742d64d4661438e07d31cd7884b72c711c65",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-downgrade.http.html": [
- "3209c5beebf69df7088635450351131464d34e94",
- "testharness"
- ],
"referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-insecure.http.html": [
"3209c5beebf69df7088635450351131464d34e94",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-upgrade.http.html": [
- "3209c5beebf69df7088635450351131464d34e94",
- "testharness"
- ],
"referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/a-tag/no-redirect/cross-origin.http.html": [
"d78b7146cceff8e134e44238addb4c03d88eef85",
"testharness"
@@ -653440,14 +653065,6 @@
"9ce1de38843b358434a917f1c992c99d0c7fd9fb",
"support"
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/a-tag/no-redirect/same-origin-downgrade.http.html": [
- "79e75063576a06b42944d30e579f12dd07010fb9",
- "testharness"
- ],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/a-tag/no-redirect/same-origin-downgrade.http.html.headers": [
- "9ce1de38843b358434a917f1c992c99d0c7fd9fb",
- "support"
- ],
"referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/a-tag/no-redirect/same-origin-upgrade.http.html": [
"79e75063576a06b42944d30e579f12dd07010fb9",
"testharness"
@@ -653456,14 +653073,6 @@
"9ce1de38843b358434a917f1c992c99d0c7fd9fb",
"support"
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/same-origin-downgrade.http.html": [
- "ee78d6ef1e935467a6a084f439274dec79567e7b",
- "testharness"
- ],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/same-origin-downgrade.http.html.headers": [
- "9ce1de38843b358434a917f1c992c99d0c7fd9fb",
- "support"
- ],
"referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/same-origin-upgrade.http.html": [
"ee78d6ef1e935467a6a084f439274dec79567e7b",
"testharness"
@@ -653472,14 +653081,6 @@
"9ce1de38843b358434a917f1c992c99d0c7fd9fb",
"support"
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/no-redirect/same-origin-downgrade.http.html": [
- "0019b7d1f3364015539c584377d75fc961105041",
- "testharness"
- ],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/no-redirect/same-origin-downgrade.http.html.headers": [
- "9ce1de38843b358434a917f1c992c99d0c7fd9fb",
- "support"
- ],
"referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/no-redirect/same-origin-upgrade.http.html": [
"0019b7d1f3364015539c584377d75fc961105041",
"testharness"
@@ -653488,14 +653089,6 @@
"9ce1de38843b358434a917f1c992c99d0c7fd9fb",
"support"
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-downgrade.http.html": [
- "f4020bdff8a58c739526b9601a51d3a6adc971e6",
- "testharness"
- ],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-downgrade.http.html.headers": [
- "9ce1de38843b358434a917f1c992c99d0c7fd9fb",
- "support"
- ],
"referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-insecure.http.html": [
"f4020bdff8a58c739526b9601a51d3a6adc971e6",
"testharness"
@@ -653504,22 +653097,6 @@
"9ce1de38843b358434a917f1c992c99d0c7fd9fb",
"support"
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-upgrade.http.html": [
- "f4020bdff8a58c739526b9601a51d3a6adc971e6",
- "testharness"
- ],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-upgrade.http.html.headers": [
- "9ce1de38843b358434a917f1c992c99d0c7fd9fb",
- "support"
- ],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/same-origin-downgrade.http.html": [
- "48dcc5d522e87086f229d39b73210e29e9d268b8",
- "testharness"
- ],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/same-origin-downgrade.http.html.headers": [
- "9ce1de38843b358434a917f1c992c99d0c7fd9fb",
- "support"
- ],
"referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/same-origin-upgrade.http.html": [
"48dcc5d522e87086f229d39b73210e29e9d268b8",
"testharness"
@@ -653528,14 +653105,6 @@
"9ce1de38843b358434a917f1c992c99d0c7fd9fb",
"support"
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/no-redirect/same-origin-downgrade.http.html": [
- "6cc4669d98825c22ab1ae4ebc2f83611c3bf8b87",
- "testharness"
- ],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/no-redirect/same-origin-downgrade.http.html.headers": [
- "9ce1de38843b358434a917f1c992c99d0c7fd9fb",
- "support"
- ],
"referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/no-redirect/same-origin-upgrade.http.html": [
"6cc4669d98825c22ab1ae4ebc2f83611c3bf8b87",
"testharness"
@@ -653544,14 +653113,6 @@
"9ce1de38843b358434a917f1c992c99d0c7fd9fb",
"support"
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-downgrade.http.html": [
- "b1bacfe9bbad91ab236d2d0d5bce7e6003c49cbd",
- "testharness"
- ],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-downgrade.http.html.headers": [
- "9ce1de38843b358434a917f1c992c99d0c7fd9fb",
- "support"
- ],
"referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-insecure.http.html": [
"b1bacfe9bbad91ab236d2d0d5bce7e6003c49cbd",
"testharness"
@@ -653560,22 +653121,6 @@
"9ce1de38843b358434a917f1c992c99d0c7fd9fb",
"support"
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-upgrade.http.html": [
- "b1bacfe9bbad91ab236d2d0d5bce7e6003c49cbd",
- "testharness"
- ],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-upgrade.http.html.headers": [
- "9ce1de38843b358434a917f1c992c99d0c7fd9fb",
- "support"
- ],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/same-origin-downgrade.http.html": [
- "08156b668c4cd77941068946bef80083e2c69fca",
- "testharness"
- ],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/same-origin-downgrade.http.html.headers": [
- "9ce1de38843b358434a917f1c992c99d0c7fd9fb",
- "support"
- ],
"referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/same-origin-upgrade.http.html": [
"08156b668c4cd77941068946bef80083e2c69fca",
"testharness"
@@ -653584,14 +653129,6 @@
"9ce1de38843b358434a917f1c992c99d0c7fd9fb",
"support"
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/no-redirect/same-origin-downgrade.http.html": [
- "ae1f44978c7b6d933da161515fc8edaa0824771a",
- "testharness"
- ],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/no-redirect/same-origin-downgrade.http.html.headers": [
- "9ce1de38843b358434a917f1c992c99d0c7fd9fb",
- "support"
- ],
"referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/no-redirect/same-origin-upgrade.http.html": [
"ae1f44978c7b6d933da161515fc8edaa0824771a",
"testharness"
@@ -653600,14 +653137,6 @@
"9ce1de38843b358434a917f1c992c99d0c7fd9fb",
"support"
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-downgrade.http.html": [
- "7b0f9d4b3b7d64c16be5bc4734896782e845237f",
- "testharness"
- ],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-downgrade.http.html.headers": [
- "9ce1de38843b358434a917f1c992c99d0c7fd9fb",
- "support"
- ],
"referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-insecure.http.html": [
"7b0f9d4b3b7d64c16be5bc4734896782e845237f",
"testharness"
@@ -653616,22 +653145,6 @@
"9ce1de38843b358434a917f1c992c99d0c7fd9fb",
"support"
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-upgrade.http.html": [
- "7b0f9d4b3b7d64c16be5bc4734896782e845237f",
- "testharness"
- ],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-upgrade.http.html.headers": [
- "9ce1de38843b358434a917f1c992c99d0c7fd9fb",
- "support"
- ],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/same-origin-downgrade.http.html": [
- "633eb15d97a9594632f782a0fa7722bf34bf6cba",
- "testharness"
- ],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/same-origin-downgrade.http.html.headers": [
- "9ce1de38843b358434a917f1c992c99d0c7fd9fb",
- "support"
- ],
"referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/same-origin-upgrade.http.html": [
"633eb15d97a9594632f782a0fa7722bf34bf6cba",
"testharness"
@@ -653640,14 +653153,6 @@
"9ce1de38843b358434a917f1c992c99d0c7fd9fb",
"support"
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/no-redirect/same-origin-downgrade.http.html": [
- "b7dd2d260b232c707390d2b47dfb16813615df2e",
- "testharness"
- ],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/no-redirect/same-origin-downgrade.http.html.headers": [
- "9ce1de38843b358434a917f1c992c99d0c7fd9fb",
- "support"
- ],
"referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/no-redirect/same-origin-upgrade.http.html": [
"b7dd2d260b232c707390d2b47dfb16813615df2e",
"testharness"
@@ -653656,14 +653161,6 @@
"9ce1de38843b358434a917f1c992c99d0c7fd9fb",
"support"
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-downgrade.http.html": [
- "d968e31f46203b4105784b40690961365662d3d6",
- "testharness"
- ],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-downgrade.http.html.headers": [
- "9ce1de38843b358434a917f1c992c99d0c7fd9fb",
- "support"
- ],
"referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-insecure.http.html": [
"d968e31f46203b4105784b40690961365662d3d6",
"testharness"
@@ -653672,22 +653169,6 @@
"9ce1de38843b358434a917f1c992c99d0c7fd9fb",
"support"
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-upgrade.http.html": [
- "d968e31f46203b4105784b40690961365662d3d6",
- "testharness"
- ],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-upgrade.http.html.headers": [
- "9ce1de38843b358434a917f1c992c99d0c7fd9fb",
- "support"
- ],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/same-origin-downgrade.http.html": [
- "cde3c4dcb62cb95d327c2203968ef4e5b5cc174f",
- "testharness"
- ],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/same-origin-downgrade.http.html.headers": [
- "9ce1de38843b358434a917f1c992c99d0c7fd9fb",
- "support"
- ],
"referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/same-origin-upgrade.http.html": [
"cde3c4dcb62cb95d327c2203968ef4e5b5cc174f",
"testharness"
@@ -653696,14 +653177,6 @@
"9ce1de38843b358434a917f1c992c99d0c7fd9fb",
"support"
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/no-redirect/same-origin-downgrade.http.html": [
- "69e0ac3f3922c48c41c57b7300865e08a7fdb6e7",
- "testharness"
- ],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/no-redirect/same-origin-downgrade.http.html.headers": [
- "9ce1de38843b358434a917f1c992c99d0c7fd9fb",
- "support"
- ],
"referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/no-redirect/same-origin-upgrade.http.html": [
"69e0ac3f3922c48c41c57b7300865e08a7fdb6e7",
"testharness"
@@ -653712,14 +653185,6 @@
"9ce1de38843b358434a917f1c992c99d0c7fd9fb",
"support"
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-downgrade.http.html": [
- "f9f5cbfc2e0ecf380f62f04c4f9bf2ffb6e10534",
- "testharness"
- ],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-downgrade.http.html.headers": [
- "9ce1de38843b358434a917f1c992c99d0c7fd9fb",
- "support"
- ],
"referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-insecure.http.html": [
"f9f5cbfc2e0ecf380f62f04c4f9bf2ffb6e10534",
"testharness"
@@ -653728,14 +653193,6 @@
"9ce1de38843b358434a917f1c992c99d0c7fd9fb",
"support"
],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-upgrade.http.html": [
- "f9f5cbfc2e0ecf380f62f04c4f9bf2ffb6e10534",
- "testharness"
- ],
- "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-upgrade.http.html.headers": [
- "9ce1de38843b358434a917f1c992c99d0c7fd9fb",
- "support"
- ],
"referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/a-tag/no-redirect/cross-origin.http.html": [
"6a1e8da86f081b700f2e6192b0852450d972108f",
"testharness"
@@ -653952,154 +653409,70 @@
"ef09fe30ce3da89607db242df4e06990b1ab26f2",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/a-tag/no-redirect/same-origin-downgrade.http.html": [
- "2111a0cf7c5bb0529561706867d66a4819335b6e",
- "testharness"
- ],
"referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/a-tag/no-redirect/same-origin-upgrade.http.html": [
"2111a0cf7c5bb0529561706867d66a4819335b6e",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/keep-origin-redirect/same-origin-downgrade.http.html": [
- "f0adebf34b3c564d4badce6964258047c0c96bf4",
- "testharness"
- ],
"referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/keep-origin-redirect/same-origin-upgrade.http.html": [
"f0adebf34b3c564d4badce6964258047c0c96bf4",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/no-redirect/same-origin-downgrade.http.html": [
- "4d5714f87f1b4be87e3aee22b2c326d56206ef87",
- "testharness"
- ],
"referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/no-redirect/same-origin-upgrade.http.html": [
"4d5714f87f1b4be87e3aee22b2c326d56206ef87",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-downgrade.http.html": [
- "6578bd1e63116f370364f72ebfbc9db3d64f45c5",
- "testharness"
- ],
"referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-insecure.http.html": [
"6578bd1e63116f370364f72ebfbc9db3d64f45c5",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-upgrade.http.html": [
- "6578bd1e63116f370364f72ebfbc9db3d64f45c5",
- "testharness"
- ],
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/same-origin-downgrade.http.html": [
- "94802477e7b3e3a18e73384e4cca72eca117757c",
- "testharness"
- ],
"referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/same-origin-upgrade.http.html": [
"94802477e7b3e3a18e73384e4cca72eca117757c",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/no-redirect/same-origin-downgrade.http.html": [
- "a4298049e507656615a75676b31a6524572462d6",
- "testharness"
- ],
"referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/no-redirect/same-origin-upgrade.http.html": [
"a4298049e507656615a75676b31a6524572462d6",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-downgrade.http.html": [
- "548e63ea9741e8cc94287be956bb3cb65cacc35e",
- "testharness"
- ],
"referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-insecure.http.html": [
"548e63ea9741e8cc94287be956bb3cb65cacc35e",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-upgrade.http.html": [
- "548e63ea9741e8cc94287be956bb3cb65cacc35e",
- "testharness"
- ],
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/keep-origin-redirect/same-origin-downgrade.http.html": [
- "32da6f1eaae40569e070e30c7ad931bd1b0cad11",
- "testharness"
- ],
"referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/keep-origin-redirect/same-origin-upgrade.http.html": [
"32da6f1eaae40569e070e30c7ad931bd1b0cad11",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/no-redirect/same-origin-downgrade.http.html": [
- "c7367f7065972721dff937e3d7a1c92b1e1e826d",
- "testharness"
- ],
"referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/no-redirect/same-origin-upgrade.http.html": [
"c7367f7065972721dff937e3d7a1c92b1e1e826d",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-downgrade.http.html": [
- "a0e33c7205f12e0e3f6cefa85e4bbec50fa41cf1",
- "testharness"
- ],
"referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-insecure.http.html": [
"a0e33c7205f12e0e3f6cefa85e4bbec50fa41cf1",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-upgrade.http.html": [
- "a0e33c7205f12e0e3f6cefa85e4bbec50fa41cf1",
- "testharness"
- ],
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/keep-origin-redirect/same-origin-downgrade.http.html": [
- "c80a3c7e52f608695d03587f8b1f9c8d3f3ed0b8",
- "testharness"
- ],
"referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/keep-origin-redirect/same-origin-upgrade.http.html": [
"c80a3c7e52f608695d03587f8b1f9c8d3f3ed0b8",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/no-redirect/same-origin-downgrade.http.html": [
- "e7e65e19ec66aa167cd0cfd6d8ea8ec6f5cd366f",
- "testharness"
- ],
"referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/no-redirect/same-origin-upgrade.http.html": [
"e7e65e19ec66aa167cd0cfd6d8ea8ec6f5cd366f",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-downgrade.http.html": [
- "42ecdbc0fd8be472b52e9c0f72350b8cd5e99aa1",
- "testharness"
- ],
"referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-insecure.http.html": [
"42ecdbc0fd8be472b52e9c0f72350b8cd5e99aa1",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-upgrade.http.html": [
- "42ecdbc0fd8be472b52e9c0f72350b8cd5e99aa1",
- "testharness"
- ],
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/keep-origin-redirect/same-origin-downgrade.http.html": [
- "c6dcc471c47de7379cde919a60beac5acd14325a",
- "testharness"
- ],
"referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/keep-origin-redirect/same-origin-upgrade.http.html": [
"c6dcc471c47de7379cde919a60beac5acd14325a",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/no-redirect/same-origin-downgrade.http.html": [
- "53505abe07c2dc804067e14f9d020e6158efda5f",
- "testharness"
- ],
"referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/no-redirect/same-origin-upgrade.http.html": [
"53505abe07c2dc804067e14f9d020e6158efda5f",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-downgrade.http.html": [
- "76b1b2df5fa373a09483837f4e3b9257630d483d",
- "testharness"
- ],
"referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-insecure.http.html": [
"76b1b2df5fa373a09483837f4e3b9257630d483d",
"testharness"
],
- "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-upgrade.http.html": [
- "76b1b2df5fa373a09483837f4e3b9257630d483d",
- "testharness"
- ],
"referrer-policy/origin/attr-referrer/cross-origin/http-http/a-tag/no-redirect/generic.http.html": [
"290d81d821a60cbef0a407bda075d70cdd8ca43f",
"testharness"
@@ -655941,11 +655314,11 @@
"testharness"
],
"referrer-policy/spec.src.json": [
- "f96eaf594e5c7404b654c4f378f8d80de6e6b427",
+ "97fbad62043c081e4696b13ee6a48fb31efc9eef",
"support"
],
"referrer-policy/spec_json.js": [
- "32a32fbc35d8579b7a34ca26b5003290ca45d882",
+ "d178c9f2346c3780c85d3e99dbe59b905677037a",
"support"
],
"referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-http/a-tag/no-redirect/cross-insecure.http.html": [
@@ -665404,6 +664777,10 @@
"5ba2531ff26a27f6309bce11d488d2ff77f563f3",
"testharness"
],
+ "shadow-dom/offsetParent-across-shadow-boundaries.html": [
+ "5491e2121336d1b59ef69198fd048a22acc80d46",
+ "testharness"
+ ],
"shadow-dom/reference/empty.html": [
"0e76edd65b7baf5316fc9d0c4da59a3502e4c27a",
"support"
@@ -665752,6 +665129,10 @@
"f1dbfe6d1adbe7ef7663c5298692872897ce3e0c",
"support"
],
+ "signed-exchange/check-cert-request.tentative.html": [
+ "5a89066c012ad9ffedd2b4917550d017b04814f8",
+ "testharness"
+ ],
"signed-exchange/fallback-to-another-sxg.tentative.html": [
"0dbbd4a84b2d6ee6713530640994f1eda3f9c324",
"testharness"
@@ -665780,6 +665161,18 @@
"d581d5987ea0f9d7c8164d680a4527f2ea519cd4",
"support"
],
+ "signed-exchange/resources/check-cert-request.py": [
+ "ce95f0699eb8b7d977fd22ecc484bed756d8da7f",
+ "support"
+ ],
+ "signed-exchange/resources/check-cert-request.sxg": [
+ "05f1646cfeb72d4c697ec73cee8855b787667568",
+ "support"
+ ],
+ "signed-exchange/resources/check-cert-request.sxg.headers": [
+ "ca41178420c5b2adf70c439435d40b6370535330",
+ "support"
+ ],
"signed-exchange/resources/failure.html": [
"1071f082b771c0daab9e8130347622ec28b3a0ec",
"support"
@@ -665797,7 +665190,7 @@
"support"
],
"signed-exchange/resources/generate-test-sxgs.sh": [
- "a31ce6810d33c5a82b4453b71cb7e4d8248e914e",
+ "8359a137b8f296654d687ecbb61dc5bba7dbfaf1",
"support"
],
"signed-exchange/resources/inner-url.html": [
@@ -665856,6 +665249,14 @@
"ca41178420c5b2adf70c439435d40b6370535330",
"support"
],
+ "signed-exchange/resources/sxg-noncacheable.sxg": [
+ "38be1eeb3aa041c267f7dc117314d5cb0a864cf2",
+ "support"
+ ],
+ "signed-exchange/resources/sxg-noncacheable.sxg.headers": [
+ "ca41178420c5b2adf70c439435d40b6370535330",
+ "support"
+ ],
"signed-exchange/resources/sxg-utf8-inner-url.sxg": [
"c8f8a94ef90bed5383bbfc5742759893a1d21798",
"support"
@@ -665904,6 +665305,10 @@
"50a9ce30d80f9e41b6993e368da9f6ac71045cc4",
"testharness"
],
+ "signed-exchange/sxg-noncacheable.tentative.html": [
+ "82c9fb0d0290e8c7d74cc23736bd00579004a53d",
+ "testharness"
+ ],
"signed-exchange/sxg-prefetch-resource-timing.tentative.html": [
"f0dc477e730ed45e32c43b70ca546d9790b6839d",
"testharness"
@@ -675573,7 +674978,7 @@
"support"
],
"tools/wptrunner/wptrunner/executors/executormarionette.py": [
- "d471b4ed6603075d0764aece41a5a5bbf40405f1",
+ "d69e998e2c302f1983bd43541054ba84b745bbe3",
"support"
],
"tools/wptrunner/wptrunner/executors/executoropera.py": [
@@ -676981,7 +676386,7 @@
"support"
],
"upgrade-insecure-requests/support/testharness-helper.sub.js": [
- "383506a143713b75d43b2d8ee482a86c6f5efb78",
+ "8bf576c2abd43a0d26bf1370ae69e8828a5a0d7d",
"support"
],
"upgrade-insecure-requests/websocket-upgrade.https.html": [
@@ -678809,7 +678214,7 @@
"support"
],
"web-animations/animation-model/animation-types/property-types.js": [
- "9382c6297b9bb07ae06f95fbd099bcda5727a85f",
+ "64a7eb4762754adf693074ee1bc7780c81ffbe3e",
"support"
],
"web-animations/animation-model/animation-types/visibility.html": [
@@ -681977,7 +681382,7 @@
"testharness"
],
"webrtc/RTCDtlsTransport-state.html": [
- "283ab087f703e5cd43df92d6240ad7d7babe4f2c",
+ "fd7215fa4e162acaed2af563c83b5b0846af3dd5",
"testharness"
],
"webrtc/RTCIceCandidate-constructor.html": [
diff --git a/tests/wpt/metadata/css/css-backgrounds/background-image-centered-with-border-radius.html.ini b/tests/wpt/metadata/css/css-backgrounds/background-image-centered-with-border-radius.html.ini
new file mode 100644
index 00000000000..24396c50056
--- /dev/null
+++ b/tests/wpt/metadata/css/css-backgrounds/background-image-centered-with-border-radius.html.ini
@@ -0,0 +1,2 @@
+[background-image-centered-with-border-radius.html]
+ expected: FAIL
diff --git a/tests/wpt/metadata/css/css-fonts/variations/at-font-face-font-matching.html.ini b/tests/wpt/metadata/css/css-fonts/variations/at-font-face-font-matching.html.ini
index 990f3fbd8c2..7851ab8dfa8 100644
--- a/tests/wpt/metadata/css/css-fonts/variations/at-font-face-font-matching.html.ini
+++ b/tests/wpt/metadata/css/css-fonts/variations/at-font-face-font-matching.html.ini
@@ -23,9 +23,6 @@
[Matching font-weight: '430' should prefer '450 460' over '500']
expected: FAIL
- [Matching font-weight: '430' should prefer '500' over '400 425']
- expected: FAIL
-
[Matching font-weight: '430' should prefer '400 425' over '350 399']
expected: FAIL
diff --git a/tests/wpt/metadata/css/css-transitions/transitions-animatable-properties-01.html.ini b/tests/wpt/metadata/css/css-transitions/transitions-animatable-properties-01.html.ini
index 1c8f983cd37..8850ec200da 100644
--- a/tests/wpt/metadata/css/css-transitions/transitions-animatable-properties-01.html.ini
+++ b/tests/wpt/metadata/css/css-transitions/transitions-animatable-properties-01.html.ini
@@ -74,6 +74,3 @@
[opacity end]
expected: FAIL
- [outline-width end]
- expected: FAIL
-
diff --git a/tests/wpt/metadata/encoding/encodeInto.any.js.ini b/tests/wpt/metadata/encoding/encodeInto.any.js.ini
new file mode 100644
index 00000000000..aef7fbebc07
--- /dev/null
+++ b/tests/wpt/metadata/encoding/encodeInto.any.js.ini
@@ -0,0 +1,261 @@
+[encodeInto.any.html]
+ [encodeInto() with 𝌆A and destination length 3, offset 4, filler 128]
+ expected: FAIL
+
+ [encodeInto() with ¥¥ and destination length 4, offset 4, filler 128]
+ expected: FAIL
+
+ [encodeInto() with ¥¥ and destination length 4, offset 0, filler random]
+ expected: FAIL
+
+ [encodeInto() with 𝌆A and destination length 3, offset 4, filler 0]
+ expected: FAIL
+
+ [encodeInto() with ¥¥ and destination length 4, offset 4, filler random]
+ expected: FAIL
+
+ [encodeInto() with A� and destination length 4, offset 0, filler 128]
+ expected: FAIL
+
+ [encodeInto() with 𝌆 and destination length 4, offset 0, filler 128]
+ expected: FAIL
+
+ [encodeInto() with A� and destination length 4, offset 0, filler random]
+ expected: FAIL
+
+ [encodeInto() with �A�A¥Hi and destination length 10, offset 0, filler random]
+ expected: FAIL
+
+ [encodeInto() with 𝌆A and destination length 3, offset 0, filler random]
+ expected: FAIL
+
+ [encodeInto() with A and destination length 10, offset 0, filler random]
+ expected: FAIL
+
+ [encodeInto() with A and destination length 10, offset 0, filler 128]
+ expected: FAIL
+
+ [encodeInto() with A and destination length 10, offset 0, filler 0]
+ expected: FAIL
+
+ [encodeInto() with Hi and destination length 0, offset 0, filler 128]
+ expected: FAIL
+
+ [encodeInto() with �A�A¥Hi and destination length 10, offset 0, filler 0]
+ expected: FAIL
+
+ [encodeInto() with A� and destination length 4, offset 4, filler 128]
+ expected: FAIL
+
+ [encodeInto() with 𝌆 and destination length 4, offset 4, filler random]
+ expected: FAIL
+
+ [encodeInto() with 𝌆A and destination length 3, offset 0, filler 0]
+ expected: FAIL
+
+ [encodeInto() with �A�A¥Hi and destination length 10, offset 4, filler 128]
+ expected: FAIL
+
+ [encodeInto() with A and destination length 10, offset 4, filler 0]
+ expected: FAIL
+
+ [encodeInto() cannot operate on a detached buffer]
+ expected: FAIL
+
+ [encodeInto() with Hi and destination length 0, offset 0, filler random]
+ expected: FAIL
+
+ [encodeInto() with A� and destination length 4, offset 4, filler 0]
+ expected: FAIL
+
+ [encodeInto() with �A�A¥Hi and destination length 10, offset 0, filler 128]
+ expected: FAIL
+
+ [encodeInto() with Hi and destination length 0, offset 4, filler random]
+ expected: FAIL
+
+ [encodeInto() with ¥¥ and destination length 4, offset 4, filler 0]
+ expected: FAIL
+
+ [encodeInto() with A� and destination length 4, offset 4, filler random]
+ expected: FAIL
+
+ [encodeInto() with Hi and destination length 0, offset 0, filler 0]
+ expected: FAIL
+
+ [encodeInto() with Hi and destination length 0, offset 4, filler 0]
+ expected: FAIL
+
+ [encodeInto() with 𝌆 and destination length 4, offset 0, filler random]
+ expected: FAIL
+
+ [encodeInto() with Hi and destination length 0, offset 4, filler 128]
+ expected: FAIL
+
+ [encodeInto() with �A�A¥Hi and destination length 10, offset 4, filler 0]
+ expected: FAIL
+
+ [encodeInto() with ¥¥ and destination length 4, offset 0, filler 128]
+ expected: FAIL
+
+ [encodeInto() with A� and destination length 4, offset 0, filler 0]
+ expected: FAIL
+
+ [encodeInto() with 𝌆 and destination length 4, offset 0, filler 0]
+ expected: FAIL
+
+ [encodeInto() with �A�A¥Hi and destination length 10, offset 4, filler random]
+ expected: FAIL
+
+ [encodeInto() with A and destination length 10, offset 4, filler 128]
+ expected: FAIL
+
+ [encodeInto() with ¥¥ and destination length 4, offset 0, filler 0]
+ expected: FAIL
+
+ [encodeInto() with 𝌆A and destination length 3, offset 0, filler 128]
+ expected: FAIL
+
+ [encodeInto() with 𝌆 and destination length 4, offset 4, filler 0]
+ expected: FAIL
+
+ [encodeInto() with 𝌆A and destination length 3, offset 4, filler random]
+ expected: FAIL
+
+ [encodeInto() with 𝌆 and destination length 4, offset 4, filler 128]
+ expected: FAIL
+
+ [encodeInto() with A and destination length 10, offset 4, filler random]
+ expected: FAIL
+
+
+[encodeInto.any.worker.html]
+ [encodeInto() with 𝌆A and destination length 3, offset 4, filler 128]
+ expected: FAIL
+
+ [encodeInto() with ¥¥ and destination length 4, offset 4, filler 128]
+ expected: FAIL
+
+ [encodeInto() with ¥¥ and destination length 4, offset 0, filler random]
+ expected: FAIL
+
+ [encodeInto() with 𝌆A and destination length 3, offset 4, filler 0]
+ expected: FAIL
+
+ [encodeInto() with ¥¥ and destination length 4, offset 4, filler random]
+ expected: FAIL
+
+ [encodeInto() with A� and destination length 4, offset 0, filler 128]
+ expected: FAIL
+
+ [encodeInto() with 𝌆 and destination length 4, offset 0, filler 128]
+ expected: FAIL
+
+ [encodeInto() with A� and destination length 4, offset 0, filler random]
+ expected: FAIL
+
+ [encodeInto() with �A�A¥Hi and destination length 10, offset 0, filler random]
+ expected: FAIL
+
+ [encodeInto() with 𝌆A and destination length 3, offset 0, filler random]
+ expected: FAIL
+
+ [encodeInto() with A and destination length 10, offset 0, filler random]
+ expected: FAIL
+
+ [encodeInto() with A and destination length 10, offset 0, filler 128]
+ expected: FAIL
+
+ [encodeInto() with A and destination length 10, offset 0, filler 0]
+ expected: FAIL
+
+ [encodeInto() with Hi and destination length 0, offset 0, filler 128]
+ expected: FAIL
+
+ [encodeInto() with �A�A¥Hi and destination length 10, offset 0, filler 0]
+ expected: FAIL
+
+ [encodeInto() with A� and destination length 4, offset 4, filler 128]
+ expected: FAIL
+
+ [encodeInto() with 𝌆 and destination length 4, offset 4, filler random]
+ expected: FAIL
+
+ [encodeInto() with 𝌆A and destination length 3, offset 0, filler 0]
+ expected: FAIL
+
+ [encodeInto() with �A�A¥Hi and destination length 10, offset 4, filler 128]
+ expected: FAIL
+
+ [encodeInto() with A and destination length 10, offset 4, filler 0]
+ expected: FAIL
+
+ [encodeInto() cannot operate on a detached buffer]
+ expected: FAIL
+
+ [encodeInto() with Hi and destination length 0, offset 0, filler random]
+ expected: FAIL
+
+ [encodeInto() with A� and destination length 4, offset 4, filler 0]
+ expected: FAIL
+
+ [encodeInto() with �A�A¥Hi and destination length 10, offset 0, filler 128]
+ expected: FAIL
+
+ [encodeInto() with Hi and destination length 0, offset 4, filler random]
+ expected: FAIL
+
+ [encodeInto() with ¥¥ and destination length 4, offset 4, filler 0]
+ expected: FAIL
+
+ [encodeInto() with A� and destination length 4, offset 4, filler random]
+ expected: FAIL
+
+ [encodeInto() with Hi and destination length 0, offset 0, filler 0]
+ expected: FAIL
+
+ [encodeInto() with Hi and destination length 0, offset 4, filler 0]
+ expected: FAIL
+
+ [encodeInto() with 𝌆 and destination length 4, offset 0, filler random]
+ expected: FAIL
+
+ [encodeInto() with Hi and destination length 0, offset 4, filler 128]
+ expected: FAIL
+
+ [encodeInto() with �A�A¥Hi and destination length 10, offset 4, filler 0]
+ expected: FAIL
+
+ [encodeInto() with ¥¥ and destination length 4, offset 0, filler 128]
+ expected: FAIL
+
+ [encodeInto() with A� and destination length 4, offset 0, filler 0]
+ expected: FAIL
+
+ [encodeInto() with 𝌆 and destination length 4, offset 0, filler 0]
+ expected: FAIL
+
+ [encodeInto() with �A�A¥Hi and destination length 10, offset 4, filler random]
+ expected: FAIL
+
+ [encodeInto() with A and destination length 10, offset 4, filler 128]
+ expected: FAIL
+
+ [encodeInto() with ¥¥ and destination length 4, offset 0, filler 0]
+ expected: FAIL
+
+ [encodeInto() with 𝌆A and destination length 3, offset 0, filler 128]
+ expected: FAIL
+
+ [encodeInto() with 𝌆 and destination length 4, offset 4, filler 0]
+ expected: FAIL
+
+ [encodeInto() with 𝌆A and destination length 3, offset 4, filler random]
+ expected: FAIL
+
+ [encodeInto() with 𝌆 and destination length 4, offset 4, filler 128]
+ expected: FAIL
+
+ [encodeInto() with A and destination length 10, offset 4, filler random]
+ expected: FAIL
+
diff --git a/tests/wpt/metadata/encoding/single-byte-decoder.html.ini b/tests/wpt/metadata/encoding/single-byte-decoder.html.ini
index 877c5d2c7ba..83141496741 100644
--- a/tests/wpt/metadata/encoding/single-byte-decoder.html.ini
+++ b/tests/wpt/metadata/encoding/single-byte-decoder.html.ini
@@ -2,7 +2,7 @@
type: testharness
[single-byte-decoder.html?document]
- expected: TIMEOUT
+ expected: CRASH
[ISO-8859-4: iso_8859-4:1988 (document.characterSet and document.inputEncoding)]
expected: FAIL
@@ -32,7 +32,7 @@
[single-byte-decoder.html?XMLHttpRequest]
- expected: CRASH
+ expected: TIMEOUT
[ISO-8859-2: iso_8859-2:1987 (XMLHttpRequest)]
expected: FAIL
@@ -55,7 +55,7 @@
expected: FAIL
[windows-1252: iso_8859-1:1987 (XMLHttpRequest)]
- expected: FAIL
+ expected: TIMEOUT
[windows-1254: iso_8859-9:1989 (XMLHttpRequest)]
expected: TIMEOUT
@@ -141,5 +141,44 @@
[windows-1254: cp1254 (XMLHttpRequest)]
expected: TIMEOUT
+ [windows-1252: iso88591 (XMLHttpRequest)]
+ expected: TIMEOUT
+
+ [windows-1252: ibm819 (XMLHttpRequest)]
+ expected: TIMEOUT
+
+ [windows-1252: iso_8859-1 (XMLHttpRequest)]
+ expected: TIMEOUT
+
+ [windows-1252: latin1 (XMLHttpRequest)]
+ expected: TIMEOUT
+
+ [windows-1253: cp1253 (XMLHttpRequest)]
+ expected: TIMEOUT
+
+ [windows-1252: csisolatin1 (XMLHttpRequest)]
+ expected: TIMEOUT
+
+ [windows-1252: iso8859-1 (XMLHttpRequest)]
+ expected: TIMEOUT
+
+ [windows-1252: x-cp1252 (XMLHttpRequest)]
+ expected: TIMEOUT
+
+ [windows-1252: l1 (XMLHttpRequest)]
+ expected: TIMEOUT
+
+ [windows-1252: iso-8859-1 (XMLHttpRequest)]
+ expected: TIMEOUT
+
+ [windows-1252: windows-1252 (XMLHttpRequest)]
+ expected: TIMEOUT
+
+ [windows-1252: iso-ir-100 (XMLHttpRequest)]
+ expected: TIMEOUT
+
+ [windows-1252: us-ascii (XMLHttpRequest)]
+ expected: TIMEOUT
+
[single-byte-decoder.html?TextDecoder]
diff --git a/tests/wpt/metadata/html/browsers/history/the-history-interface/traverse_the_history_5.html.ini b/tests/wpt/metadata/html/browsers/history/the-history-interface/traverse_the_history_4.html.ini
index dc2e45516de..385376c7321 100644
--- a/tests/wpt/metadata/html/browsers/history/the-history-interface/traverse_the_history_5.html.ini
+++ b/tests/wpt/metadata/html/browsers/history/the-history-interface/traverse_the_history_4.html.ini
@@ -1,4 +1,4 @@
-[traverse_the_history_5.html]
+[traverse_the_history_4.html]
[Multiple history traversals, last would be aborted]
expected: FAIL
diff --git a/tests/wpt/metadata/html/semantics/embedded-content/the-img-element/environment-changes/viewport-change.html.ini b/tests/wpt/metadata/html/semantics/embedded-content/the-img-element/environment-changes/viewport-change.html.ini
index e16c5dbd9b0..bed3bccce25 100644
--- a/tests/wpt/metadata/html/semantics/embedded-content/the-img-element/environment-changes/viewport-change.html.ini
+++ b/tests/wpt/metadata/html/semantics/embedded-content/the-img-element/environment-changes/viewport-change.html.ini
@@ -5,7 +5,7 @@
expected: TIMEOUT
[picture: source (max-width:500px) valid image, img valid image, resize to wide]
- expected: FAIL
+ expected: TIMEOUT
[picture: source (max-width:500px) valid image, img broken image, resize to narrow]
expected: TIMEOUT
@@ -13,12 +13,3 @@
[picture: source (max-width:500px) valid image, img valid image, resize to narrow]
expected: FAIL
- [picture: source (max-width:500px) broken image, img valid image, resize to narrow]
- expected: FAIL
-
- [img (srcset 1 cand) valid image, resize to narrow]
- expected: FAIL
-
- [picture: same URL in source (max-width:500px) and img, resize to narrow]
- expected: FAIL
-
diff --git a/tests/wpt/metadata/html/semantics/embedded-content/the-img-element/sizes/sizes-dynamic-002.html.ini b/tests/wpt/metadata/html/semantics/embedded-content/the-img-element/sizes/sizes-dynamic-002.html.ini
new file mode 100644
index 00000000000..66c6379adef
--- /dev/null
+++ b/tests/wpt/metadata/html/semantics/embedded-content/the-img-element/sizes/sizes-dynamic-002.html.ini
@@ -0,0 +1,2 @@
+[sizes-dynamic-002.html]
+ expected: TIMEOUT
diff --git a/tests/wpt/metadata/html/semantics/interactive-elements/the-details-element/toggleEvent.html.ini b/tests/wpt/metadata/html/semantics/interactive-elements/the-details-element/toggleEvent.html.ini
deleted file mode 100644
index 9e522297c94..00000000000
--- a/tests/wpt/metadata/html/semantics/interactive-elements/the-details-element/toggleEvent.html.ini
+++ /dev/null
@@ -1,7 +0,0 @@
-[toggleEvent.html]
- [Calling open twice on 'details' fires only one toggle event]
- expected: FAIL
-
- [Setting open=true to opened 'details' element should not fire a toggle event at the 'details' element]
- expected: FAIL
-
diff --git a/tests/wpt/metadata/html/webappapis/scripting/processing-model-2/unhandled-promise-rejections/promise-rejection-events.html.ini b/tests/wpt/metadata/html/webappapis/scripting/processing-model-2/unhandled-promise-rejections/promise-rejection-events.html.ini
deleted file mode 100644
index 63682614c4f..00000000000
--- a/tests/wpt/metadata/html/webappapis/scripting/processing-model-2/unhandled-promise-rejections/promise-rejection-events.html.ini
+++ /dev/null
@@ -1,5 +0,0 @@
-[promise-rejection-events.html]
- expected: TIMEOUT
- [rejectionhandled is dispatched from a queued task, and not immediately]
- expected: TIMEOUT
-
diff --git a/tests/wpt/metadata/workers/semantics/multiple-workers/005.html.ini b/tests/wpt/metadata/workers/semantics/multiple-workers/005.html.ini
index f584fce5df1..268949ced5c 100644
--- a/tests/wpt/metadata/workers/semantics/multiple-workers/005.html.ini
+++ b/tests/wpt/metadata/workers/semantics/multiple-workers/005.html.ini
@@ -1,5 +1,4 @@
[005.html]
- expected: ERROR
[dedicated worker in shared worker in dedicated worker]
expected: FAIL
diff --git a/tests/wpt/mozilla/meta/mozilla/paint_timing.html.ini b/tests/wpt/mozilla/meta/mozilla/paint_timing.html.ini
new file mode 100644
index 00000000000..14a9e778f39
--- /dev/null
+++ b/tests/wpt/mozilla/meta/mozilla/paint_timing.html.ini
@@ -0,0 +1,4 @@
+[paint_timing.html]
+ [Performance entries observer]
+ expected: FAIL
+
diff --git a/tests/wpt/web-platform-tests/.azure-pipelines.yml b/tests/wpt/web-platform-tests/.azure-pipelines.yml
index 9ddcd25654b..773ff6cc5f9 100644
--- a/tests/wpt/web-platform-tests/.azure-pipelines.yml
+++ b/tests/wpt/web-platform-tests/.azure-pipelines.yml
@@ -10,13 +10,12 @@
# of this repository" setting must also be enabled in the Azure DevOps project:
# https://docs.microsoft.com/en-us/azure/devops/pipelines/repos/github#validate-contributions-from-forks
-trigger: none # disable builds for branches
-
jobs:
# The affected tests jobs are unconditional for speed, as most PRs have one or
# more affected tests: https://github.com/web-platform-tests/wpt/issues/13936.
- job: affected_macOS
displayName: 'affected tests (Safari Technology Preview)'
+ condition: eq(variables['Build.Reason'], 'PullRequest')
pool:
vmImage: 'macOS-10.13'
steps:
@@ -26,6 +25,7 @@ jobs:
- job: affected_without_changes_macOS
displayName: 'affected tests without changes (Safari Technology Preview)'
+ condition: eq(variables['Build.Reason'], 'PullRequest')
pool:
vmImage: 'macOS-10.13'
steps:
@@ -39,6 +39,7 @@ jobs:
# and all following jobs wait for it to finish and depend on its output.
- job: decision
displayName: './wpt test-jobs'
+ condition: eq(variables['Build.Reason'], 'PullRequest')
pool:
vmImage: 'ubuntu-16.04'
steps:
@@ -121,3 +122,29 @@ jobs:
- template: tools/ci/azure/tox_pytest.yml
parameters:
directory: tools/wpt/
+
+- job: all_macOS
+ displayName: 'all tests (Safari Technology Preview)'
+ condition: eq(variables['Build.SourceBranch'], 'refs/heads/epochs/daily')
+ strategy:
+ parallel: 4 # chosen to make runtime ~2h
+ timeoutInMinutes: 360
+ pool:
+ vmImage: 'macOS-10.13'
+ steps:
+ - template: tools/ci/azure/checkout.yml
+ - template: tools/ci/azure/pip_install.yml
+ parameters:
+ packages: virtualenv
+ - template: tools/ci/azure/install_fonts.yml
+ - template: tools/ci/azure/install_certs.yml
+ - template: tools/ci/azure/install_safari.yml
+ - template: tools/ci/azure/update_hosts.yml
+ - template: tools/ci/azure/update_manifest.yml
+ - script: no_proxy='*' ./wpt run --no-manifest-update --no-restart-on-unexpected --no-fail-on-unexpected --this-chunk=$(System.JobPositionInPhase) --total-chunks=$(System.TotalJobsInPhase) --chunk-type hash --log-wptreport $(Build.ArtifactStagingDirectory)/wpt_report_$(System.JobPositionInPhase).json --channel preview safari
+ displayName: 'Run tests'
+ - task: PublishBuildArtifacts@1
+ displayName: 'Publish results'
+ inputs:
+ artifactName: 'results'
+ condition: succeededOrFailed()
diff --git a/tests/wpt/web-platform-tests/2dcontext/drawing-images-to-the-canvas/drawimage_svg_image_with_foreign_object_does_not_taint.html b/tests/wpt/web-platform-tests/2dcontext/drawing-images-to-the-canvas/drawimage_svg_image_with_foreign_object_does_not_taint.html
new file mode 100644
index 00000000000..f29b2bf5a8a
--- /dev/null
+++ b/tests/wpt/web-platform-tests/2dcontext/drawing-images-to-the-canvas/drawimage_svg_image_with_foreign_object_does_not_taint.html
@@ -0,0 +1,32 @@
+<!DOCTYPE html>
+<meta charset="utf-8">
+<title>Draw an SVG image with a foreignObject to a canvas</title>
+<script src="/resources/testharness.js"></script>
+<script src="/resources/testharnessreport.js"></script>
+<script>
+function loadImage(url) {
+ return new Promise(resolve => {
+ const image = new window.Image();
+ image.onload = () => {
+ resolve(image);
+ };
+ image.src = url;
+ });
+}
+
+promise_test(async (t) => {
+ // Load a data URL for an SVG image with a foreign object.
+ const url = 'data:image/svg+xml,<svg xmlns="http://www.w3.org/2000/svg" width="100" height="100"><foreignObject></foreignObject></svg>';
+ const image = await loadImage(url);
+
+ // Draw the image to a canvas.
+ const canvas = document.createElement('canvas');
+ const context = canvas.getContext('2d');
+ canvas.width = image.width;
+ canvas.height = image.height;
+ context.drawImage(image, 0, 0);
+
+ // The canvas should not be tainted, so the following shouldn't throw.
+ assert_true(canvas.toDataURL().length > 0);
+}, 'Canvas should not be tainted after drawing SVG including <foreignObject>');
+</script>
diff --git a/tests/wpt/web-platform-tests/bluetooth/META.yml b/tests/wpt/web-platform-tests/bluetooth/META.yml
index c93f16a3a5f..501396bac74 100644
--- a/tests/wpt/web-platform-tests/bluetooth/META.yml
+++ b/tests/wpt/web-platform-tests/bluetooth/META.yml
@@ -1,5 +1,6 @@
spec: https://webbluetoothcg.github.io/web-bluetooth/
suggested_reviewers:
- - jyasskin
+ - dougt
- g-ortuno
- - scheib
+ - odejesush
+ - reillyeon
diff --git a/tests/wpt/web-platform-tests/css/compositing/inheritance.html b/tests/wpt/web-platform-tests/css/compositing/inheritance.html
new file mode 100644
index 00000000000..8bd08672edf
--- /dev/null
+++ b/tests/wpt/web-platform-tests/css/compositing/inheritance.html
@@ -0,0 +1,23 @@
+<!DOCTYPE html>
+<html>
+<head>
+<meta charset="utf-8">
+<title>Inheritance of Compositing and Blending properties</title>
+<link rel="help" href="https://drafts.fxtf.org/compositing-1/#property-index">
+<meta name="assert" content="Properties do not inherit.">
+<meta name="assert" content="Properties have initial values according to the spec.">
+<script src="/resources/testharness.js"></script>
+<script src="/resources/testharnessreport.js"></script>
+<script src="/css/support/inheritance-testcommon.js"></script>
+</head>
+<body>
+<div id="container">
+ <div id="target"></div>
+</div>
+<script>
+assert_not_inherited('background-blend-mode', 'normal', 'multiply');
+assert_not_inherited('isolation', 'auto', 'isolate');
+assert_not_inherited('mix-blend-mode', 'normal', 'overlay');
+</script>
+</body>
+</html>
diff --git a/tests/wpt/web-platform-tests/css/css-backgrounds/background-image-centered-with-border-radius.html b/tests/wpt/web-platform-tests/css/css-backgrounds/background-image-centered-with-border-radius.html
new file mode 100644
index 00000000000..602cd48aaa9
--- /dev/null
+++ b/tests/wpt/web-platform-tests/css/css-backgrounds/background-image-centered-with-border-radius.html
@@ -0,0 +1,24 @@
+<!DOCTYPE html>
+<html>
+<head>
+ <title>CSS Background Test: Centered background image with border radius</title>
+ <link rel="author" title="schenney" href="mailto:schenney@chromium.org">
+ <link rel="help" href="http://www.w3.org/TR/css3-background">
+ <link rel="match" href="reference/background-image-centered-with-border-radius-ref.html">
+ <style>
+ span {
+ background: url(support/green-60x60-red-5px-border.png) no-repeat center;
+ border: 5px solid green;
+ border-radius: 5px;
+ box-sizing: border-box;
+ display: inline-block;
+ height: 60px;
+ width: 60px;
+ }
+ </style>
+</head>
+
+<body>
+ <span></span>
+</body>
+</html>
diff --git a/tests/wpt/web-platform-tests/css/css-backgrounds/background-image-first-line.html b/tests/wpt/web-platform-tests/css/css-backgrounds/background-image-first-line.html
deleted file mode 100644
index c8dee7050b6..00000000000
--- a/tests/wpt/web-platform-tests/css/css-backgrounds/background-image-first-line.html
+++ /dev/null
@@ -1,19 +0,0 @@
-<!DOCTYPE html>
-<title>CSS Test: background-image applicability to ::first-letter</title>
-<link rel="help" href="http://www.w3.org/TR/css3-background/">
-<link rel="help" href="http://www.w3.org/TR/CSS21/selector.html#first-line-pseudo">
-<link rel="match" href="reference/background-image-first-line-ref.html">
-<meta name="flags" content="ahem image">
-<meta name="assert" content="background-image applicability to ::first-line">
-<style type="text/css">
-#content {
- color: transparent;
- font: 100px Ahem;
-}
-#content::first-line {
- background-image: url("support/cat.png"); /* 98 w. by 99px h. */
- background-repeat: no-repeat;
-}
-</style>
-<p>Test passes if cat image is visible.</p>
-<div id="content">X</div>
diff --git a/tests/wpt/web-platform-tests/css/css-backgrounds/reference/background-image-centered-with-border-radius-ref.html b/tests/wpt/web-platform-tests/css/css-backgrounds/reference/background-image-centered-with-border-radius-ref.html
new file mode 100644
index 00000000000..44db3f56017
--- /dev/null
+++ b/tests/wpt/web-platform-tests/css/css-backgrounds/reference/background-image-centered-with-border-radius-ref.html
@@ -0,0 +1,22 @@
+<!DOCTYPE html>
+<html>
+<head>
+ <title>CSS Background Test Reference</title>
+ <link rel="author" title="schenney" href="mailto:schenney@chromium.org">
+ <style>
+ span {
+ background-color: green;
+ display: inline-block;
+ height: 60px;
+ width: 60px;
+ border: 5px solid green;
+ border-radius: 5px;
+ box-sizing: border-box;
+ }
+ </style>
+</head>
+
+<body>
+ <span></span>
+</body>
+</html>
diff --git a/tests/wpt/web-platform-tests/css/css-backgrounds/reference/background-image-first-line-ref.html b/tests/wpt/web-platform-tests/css/css-backgrounds/reference/background-image-first-line-ref.html
deleted file mode 100644
index 82fd9a2d3d0..00000000000
--- a/tests/wpt/web-platform-tests/css/css-backgrounds/reference/background-image-first-line-ref.html
+++ /dev/null
@@ -1,12 +0,0 @@
-<!DOCTYPE html>
-<meta name="flags" content="ahem image">
-<style type="text/css">
-#content {
- color: transparent;
- font: 100px Ahem;
- background-image: url("../support/cat.png"); /* 98 w. by 99px h. */
- background-repeat: no-repeat;
-}
-</style>
-<p>Test passes if cat image is visible.</p>
-<div id="content">X</div>
diff --git a/tests/wpt/web-platform-tests/css/css-backgrounds/support/green-60x60-red-5px-border.png b/tests/wpt/web-platform-tests/css/css-backgrounds/support/green-60x60-red-5px-border.png
new file mode 100644
index 00000000000..97a94592dd5
--- /dev/null
+++ b/tests/wpt/web-platform-tests/css/css-backgrounds/support/green-60x60-red-5px-border.png
Binary files differ
diff --git a/tests/wpt/web-platform-tests/encoding/encodeInto.any.js b/tests/wpt/web-platform-tests/encoding/encodeInto.any.js
new file mode 100644
index 00000000000..2abc69744d7
--- /dev/null
+++ b/tests/wpt/web-platform-tests/encoding/encodeInto.any.js
@@ -0,0 +1,144 @@
+[
+ {
+ "input": "Hi",
+ "read": 0,
+ "destinationLength": 0,
+ "written": []
+ },
+ {
+ "input": "A",
+ "read": 1,
+ "destinationLength": 10,
+ "written": [0x41]
+ },
+ {
+ "input": "\u{1D306}", // "\uD834\uDF06"
+ "read": 2,
+ "destinationLength": 4,
+ "written": [0xF0, 0x9D, 0x8C, 0x86]
+ },
+ {
+ "input": "\u{1D306}A",
+ "read": 0,
+ "destinationLength": 3,
+ "written": []
+ },
+ {
+ "input": "\uD834A\uDF06A¥Hi",
+ "read": 5,
+ "destinationLength": 10,
+ "written": [0xEF, 0xBF, 0xBD, 0x41, 0xEF, 0xBF, 0xBD, 0x41, 0xC2, 0xA5]
+ },
+ {
+ "input": "A\uDF06",
+ "read": 2,
+ "destinationLength": 4,
+ "written": [0x41, 0xEF, 0xBF, 0xBD]
+ },
+ {
+ "input": "¥¥",
+ "read": 2,
+ "destinationLength": 4,
+ "written": [0xC2, 0xA5, 0xC2, 0xA5]
+ }
+].forEach(testData => {
+ [
+ {
+ "bufferIncrease": 0,
+ "destinationOffset": 0,
+ "filler": 0
+ },
+ {
+ "bufferIncrease": 10,
+ "destinationOffset": 4,
+ "filler": 0
+ },
+ {
+ "bufferIncrease": 0,
+ "destinationOffset": 0,
+ "filler": 0x80
+ },
+ {
+ "bufferIncrease": 10,
+ "destinationOffset": 4,
+ "filler": 0x80
+ },
+ {
+ "bufferIncrease": 0,
+ "destinationOffset": 0,
+ "filler": "random"
+ },
+ {
+ "bufferIncrease": 10,
+ "destinationOffset": 4,
+ "filler": "random"
+ }
+ ].forEach(destinationData => {
+ test(() => {
+ // Setup
+ const bufferLength = testData.destinationLength + destinationData.bufferIncrease,
+ destinationOffset = destinationData.destinationOffset,
+ destinationLength = testData.destinationLength,
+ destinationFiller = destinationData.filler,
+ encoder = new TextEncoder(),
+ buffer = new ArrayBuffer(bufferLength),
+ view = new Uint8Array(buffer, destinationOffset, destinationLength),
+ fullView = new Uint8Array(buffer),
+ control = new Array(bufferLength);
+ let byte = destinationFiller;
+ for (let i = 0; i < bufferLength; i++) {
+ if (destinationFiller === "random") {
+ byte = Math.floor(Math.random() * 256);
+ }
+ control[i] = byte;
+ fullView[i] = byte;
+ }
+
+ // It's happening
+ const result = encoder.encodeInto(testData.input, view);
+
+ // Basics
+ assert_equals(view.byteLength, destinationLength);
+ assert_equals(view.length, destinationLength);
+
+ // Remainder
+ assert_equals(result.read, testData.read);
+ assert_equals(result.written, testData.written.length);
+ for (let i = 0; i < bufferLength; i++) {
+ if (i < destinationOffset || i >= (destinationOffset + testData.written.length)) {
+ assert_equals(fullView[i], control[i]);
+ } else {
+ assert_equals(fullView[i], testData.written[i - destinationOffset]);
+ }
+ }
+ }, "encodeInto() with " + testData.input + " and destination length " + testData.destinationLength + ", offset " + destinationData.destinationOffset + ", filler " + destinationData.filler);
+ });
+});
+
+[DataView,
+ Int8Array,
+ Int16Array,
+ Int32Array,
+ Uint16Array,
+ Uint32Array,
+ Uint8ClampedArray,
+ Float32Array,
+ Float64Array].forEach(view => {
+ test(() => {
+ assert_throws(new TypeError(), () => new TextEncoder().encodeInto("", new view(new ArrayBuffer(0))));
+ }, "Invalid encodeInto() destination: " + view);
+ });
+
+test(() => {
+ assert_throws(new TypeError(), () => new TextEncoder().encodeInto("", new ArrayBuffer(10)));
+}, "Invalid encodeInto() destination: ArrayBuffer");
+
+test(() => {
+ const buffer = new ArrayBuffer(10),
+ view = new Uint8Array(buffer);
+ const { read, written } = new TextEncoder().encodeInto("", view);
+ assert_equals(read, 0);
+ assert_equals(written, 0);
+ self.postMessage(buffer, "/", [buffer]);
+ assert_throws(new TypeError(), () => new TextEncoder().encodeInto("", view));
+}, "encodeInto() cannot operate on a detached buffer");
diff --git a/tests/wpt/web-platform-tests/fetch/api/abort/general.any.js b/tests/wpt/web-platform-tests/fetch/api/abort/general.any.js
index 11999cc9270..d6159c7e1b0 100644
--- a/tests/wpt/web-platform-tests/fetch/api/abort/general.any.js
+++ b/tests/wpt/web-platform-tests/fetch/api/abort/general.any.js
@@ -445,7 +445,7 @@ promise_test(async t => {
const controller = new AbortController();
const signal = controller.signal;
- const response = await fetch(`../resources/method.py`, { signal });
+ const response = await fetch(`../resources/empty.txt`, { signal });
// Read whole response to ensure close signal has sent.
await response.clone().text();
diff --git a/tests/wpt/web-platform-tests/html/semantics/embedded-content/the-img-element/sizes/sizes-dynamic-002.html b/tests/wpt/web-platform-tests/html/semantics/embedded-content/the-img-element/sizes/sizes-dynamic-002.html
new file mode 100644
index 00000000000..6c64b3da392
--- /dev/null
+++ b/tests/wpt/web-platform-tests/html/semantics/embedded-content/the-img-element/sizes/sizes-dynamic-002.html
@@ -0,0 +1,33 @@
+<!doctype html>
+<html class="reftest-wait">
+<title>Image intrinsic size specified via sizes attribute reacts properly to media changes in Shadow DOM</title>
+<link rel="author" title="Emilio Cobos Álvarez" href="mailto:emilio@crisal.io">
+<link rel="match" href="sizes-dynamic-001-ref.html">
+<link rel="help" href="https://html.spec.whatwg.org/#sizes-attributes">
+<link rel="help" href="https://bugzilla.mozilla.org/show_bug.cgi?id=1149357">
+<script>
+function frameLoaded(frame) {
+ let doc = frame.contentDocument;
+ let shadow = doc.getElementById("host").attachShadow({ mode: "open" });
+
+ let img = doc.createElement("img");
+ img.srcset = "/images/green-256x256.png 100w";
+ img.style.maxWidth = "100%";
+ img.setAttribute("sizes", "(min-width: 400px) 10px, 20px");
+
+ img.onload = function() {
+ img.offsetWidth; // Flush layout.
+
+ frame.width = "500";
+
+ // Trigger the viewport resize, which will trigger the image load task.
+ img.offsetWidth;
+
+ // Wait for the image load task to run.
+ setTimeout(() => document.documentElement.removeAttribute("class"), 0);
+ };
+
+ shadow.appendChild(img);
+}
+</script>
+<iframe onload="frameLoaded(this)" width="200" height="500" srcdoc='<!doctype html><div id="host"></div>'></iframe>
diff --git a/tests/wpt/web-platform-tests/interfaces/webxr.idl b/tests/wpt/web-platform-tests/interfaces/webxr.idl
index ea45aef9771..3054500f590 100644
--- a/tests/wpt/web-platform-tests/interfaces/webxr.idl
+++ b/tests/wpt/web-platform-tests/interfaces/webxr.idl
@@ -26,15 +26,15 @@ enum XREnvironmentBlendMode {
[SecureContext, Exposed=Window] interface XRSession : EventTarget {
// Attributes
readonly attribute XRSessionMode mode;
- readonly attribute XRPresentationContext outputContext;
+ readonly attribute XRPresentationContext? outputContext;
readonly attribute XREnvironmentBlendMode environmentBlendMode;
attribute double depthNear;
attribute double depthFar;
- attribute XRLayer baseLayer;
+ attribute XRLayer? baseLayer;
// Methods
- Promise<XRReferenceSpace> requestReferenceSpace(XRReferenceSpaceType type, optional XRReferenceSpaceOptions options);
+ Promise<XRReferenceSpace> requestReferenceSpace(XRReferenceSpaceOptions options);
FrozenArray<XRInputSource> getInputSources();
@@ -61,7 +61,7 @@ enum XRSessionMode {
dictionary XRSessionCreationOptions {
XRSessionMode mode = "inline";
- XRPresentationContext outputContext;
+ XRPresentationContext? outputContext = null;
};
callback XRFrameRequestCallback = void (DOMHighResTimeStamp time, XRFrame frame);
@@ -88,6 +88,7 @@ dictionary XRReferenceSpaceOptions {
};
[SecureContext, Exposed=Window] interface XRReferenceSpace : XRSpace {
+ attribute XRRigidTransform originOffset;
attribute EventHandler onreset;
};
diff --git a/tests/wpt/web-platform-tests/mediacapture-record/MediaRecorder-disabled-tracks.https.html b/tests/wpt/web-platform-tests/mediacapture-record/MediaRecorder-disabled-tracks.https.html
new file mode 100644
index 00000000000..fe26e0c9616
--- /dev/null
+++ b/tests/wpt/web-platform-tests/mediacapture-record/MediaRecorder-disabled-tracks.https.html
@@ -0,0 +1,53 @@
+<!doctype html>
+<html>
+<head>
+ <title>MediaRecorder Disabled Tracks</title>
+ <link rel="help" href="https://w3c.github.io/mediacapture-record/MediaRecorder.html#mediarecorder">
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+</head>
+<script>
+
+ // This test verifies that MediaStream with disabled tracks can be correctly
+ // recorded. See crbug.com/878255 for more context.
+
+ [ ["video-only", {video: true, audio: false}],
+ ["audio-only", {video: false, audio: true}],
+ ["audio-video", {video: true, audio: true}]]
+ .forEach( function(args) {
+ async_test(function(test) {
+ let recorder;
+ const recorderOnDataAvailable = test.step_func(function(event) {
+ if (recorder.state != "recording")
+ return;
+
+ recorder.onstop = recorderOnStopExpected;
+ recorder.stop();
+ });
+
+ const recorderOnStopExpected = test.step_func_done();
+ const recorderOnStopUnexpected = test.unreached_func('Recording stopped.');
+ const recorderOnError = test.unreached_func('Recording error.');
+
+ const gotStream = test.step_func(function(stream) {
+ for (track in stream.getTracks())
+ track.enabled = false;
+
+ recorder = new MediaRecorder(stream);
+
+ assert_equals(recorder.state, "inactive");
+ recorder.ondataavailable = recorderOnDataAvailable;
+ recorder.onstop = recorderOnStopUnexpected;
+ recorder.onerror = recorderOnError;
+ recorder.start();
+
+ assert_equals(recorder.state, "recording");
+ recorder.requestData();
+ });
+
+ const onError = test.unreached_func('Error creating MediaStream.');
+ navigator.getUserMedia(args[1], gotStream, onError);
+ }, args[0]);
+ });
+
+</script>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/generic/tools/generate.py b/tests/wpt/web-platform-tests/referrer-policy/generic/tools/generate.py
index 30e5b6142f9..84aa9feab42 100755
--- a/tests/wpt/web-platform-tests/referrer-policy/generic/tools/generate.py
+++ b/tests/wpt/web-platform-tests/referrer-policy/generic/tools/generate.py
@@ -2,6 +2,7 @@
from __future__ import print_function
+import copy
import os, sys, json
from common_paths import *
import spec_validator
@@ -142,21 +143,33 @@ def generate_test_source_files(spec_json, target):
exclusion_dict[excluded_selection_path] = True
for spec in specification:
+ # Used to make entries with expansion="override" override preceding
+ # entries with the same |selection_path|.
+ output_dict = {}
+
for spec_test_expansion in spec['test_expansion']:
expansion = expand_test_expansion_pattern(spec_test_expansion,
test_expansion_schema)
for selection in permute_expansion(expansion):
selection_path = selection_pattern % selection
if not selection_path in exclusion_dict:
- subresource_path = \
- spec_json["subresource_path"][selection["subresource"]]
- generate_selection(selection,
- spec,
- subresource_path,
- html_template)
+ if selection_path in output_dict:
+ if spec_test_expansion['expansion'] != 'override':
+ print("Error: %s's expansion is default but overrides %s" % (selection['name'], output_dict[selection_path]['name']))
+ sys.exit(1)
+ output_dict[selection_path] = copy.deepcopy(selection)
else:
print('Excluding selection:', selection_path)
+ for selection_path in output_dict:
+ selection = output_dict[selection_path]
+ subresource_path = \
+ spec_json["subresource_path"][selection["subresource"]]
+ generate_selection(selection,
+ spec,
+ subresource_path,
+ html_template)
+
def main(target):
spec_json = load_spec_json();
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/a-tag/no-redirect/same-origin-downgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/a-tag/no-redirect/same-origin-downgrade.http.html
deleted file mode 100644
index 12903c4da40..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/a-tag/no-redirect/same-origin-downgrade.http.html
+++ /dev/null
@@ -1,40 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via a-tag using the attr-referrer
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "attr-referrer",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "a-tag",
- "subresource_path": "/referrer-policy/generic/subresource/document.py",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/same-origin-downgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/same-origin-downgrade.http.html
deleted file mode 100644
index ca0b0b1b5f5..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/same-origin-downgrade.http.html
+++ /dev/null
@@ -1,40 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via iframe-tag using the attr-referrer
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "attr-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "subresource_path": "/referrer-policy/generic/subresource/document.py",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/no-redirect/same-origin-downgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/no-redirect/same-origin-downgrade.http.html
deleted file mode 100644
index 19cf59322f7..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/no-redirect/same-origin-downgrade.http.html
+++ /dev/null
@@ -1,40 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via iframe-tag using the attr-referrer
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "attr-referrer",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "subresource_path": "/referrer-policy/generic/subresource/document.py",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-downgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-downgrade.http.html
deleted file mode 100644
index 77452623c86..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-downgrade.http.html
+++ /dev/null
@@ -1,40 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via iframe-tag using the attr-referrer
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "attr-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "subresource_path": "/referrer-policy/generic/subresource/document.py",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-upgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-upgrade.http.html
deleted file mode 100644
index 77452623c86..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-upgrade.http.html
+++ /dev/null
@@ -1,40 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via iframe-tag using the attr-referrer
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "attr-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "subresource_path": "/referrer-policy/generic/subresource/document.py",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/keep-origin-redirect/same-origin-downgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/keep-origin-redirect/same-origin-downgrade.http.html
deleted file mode 100644
index f0c9e6fd969..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/keep-origin-redirect/same-origin-downgrade.http.html
+++ /dev/null
@@ -1,40 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via img-tag using the attr-referrer
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "attr-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "img-tag",
- "subresource_path": "/referrer-policy/generic/subresource/image.py",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/no-redirect/same-origin-downgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/no-redirect/same-origin-downgrade.http.html
deleted file mode 100644
index 2aed178fd08..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/no-redirect/same-origin-downgrade.http.html
+++ /dev/null
@@ -1,40 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via img-tag using the attr-referrer
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "attr-referrer",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "img-tag",
- "subresource_path": "/referrer-policy/generic/subresource/image.py",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-downgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-downgrade.http.html
deleted file mode 100644
index 4e184519eb8..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-downgrade.http.html
+++ /dev/null
@@ -1,40 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via img-tag using the attr-referrer
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "attr-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "img-tag",
- "subresource_path": "/referrer-policy/generic/subresource/image.py",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-upgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-upgrade.http.html
deleted file mode 100644
index 4e184519eb8..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-upgrade.http.html
+++ /dev/null
@@ -1,40 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via img-tag using the attr-referrer
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "attr-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "img-tag",
- "subresource_path": "/referrer-policy/generic/subresource/image.py",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/script-tag/keep-origin-redirect/same-origin-downgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/script-tag/keep-origin-redirect/same-origin-downgrade.http.html
deleted file mode 100644
index 9063bbd5ee5..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/script-tag/keep-origin-redirect/same-origin-downgrade.http.html
+++ /dev/null
@@ -1,40 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via script-tag using the attr-referrer
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "attr-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "subresource_path": "/referrer-policy/generic/subresource/script.py",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/script-tag/no-redirect/same-origin-downgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/script-tag/no-redirect/same-origin-downgrade.http.html
deleted file mode 100644
index 56bc742d64d..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/script-tag/no-redirect/same-origin-downgrade.http.html
+++ /dev/null
@@ -1,40 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via script-tag using the attr-referrer
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "attr-referrer",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "subresource_path": "/referrer-policy/generic/subresource/script.py",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-downgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-downgrade.http.html
deleted file mode 100644
index 3209c5beebf..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-downgrade.http.html
+++ /dev/null
@@ -1,40 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via script-tag using the attr-referrer
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "attr-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "subresource_path": "/referrer-policy/generic/subresource/script.py",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-upgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-upgrade.http.html
deleted file mode 100644
index 3209c5beebf..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-upgrade.http.html
+++ /dev/null
@@ -1,40 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via script-tag using the attr-referrer
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "attr-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "subresource_path": "/referrer-policy/generic/subresource/script.py",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/a-tag/no-redirect/same-origin-downgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/a-tag/no-redirect/same-origin-downgrade.http.html
deleted file mode 100644
index 79e75063576..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/a-tag/no-redirect/same-origin-downgrade.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via a-tag using the http-rp
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "a-tag",
- "subresource_path": "/referrer-policy/generic/subresource/document.py",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/a-tag/no-redirect/same-origin-downgrade.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/a-tag/no-redirect/same-origin-downgrade.http.html.headers
deleted file mode 100644
index 9ce1de38843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/a-tag/no-redirect/same-origin-downgrade.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/same-origin-downgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/same-origin-downgrade.http.html
deleted file mode 100644
index ee78d6ef1e9..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/same-origin-downgrade.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via fetch-request using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "fetch-request",
- "subresource_path": "/referrer-policy/generic/subresource/xhr.py",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/same-origin-downgrade.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/same-origin-downgrade.http.html.headers
deleted file mode 100644
index 9ce1de38843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/same-origin-downgrade.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/no-redirect/same-origin-downgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/no-redirect/same-origin-downgrade.http.html
deleted file mode 100644
index 0019b7d1f33..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/no-redirect/same-origin-downgrade.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via fetch-request using the http-rp
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "fetch-request",
- "subresource_path": "/referrer-policy/generic/subresource/xhr.py",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/no-redirect/same-origin-downgrade.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/no-redirect/same-origin-downgrade.http.html.headers
deleted file mode 100644
index 9ce1de38843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/no-redirect/same-origin-downgrade.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-downgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-downgrade.http.html
deleted file mode 100644
index f4020bdff8a..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-downgrade.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via fetch-request using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "fetch-request",
- "subresource_path": "/referrer-policy/generic/subresource/xhr.py",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-downgrade.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-downgrade.http.html.headers
deleted file mode 100644
index 9ce1de38843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-downgrade.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-upgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-upgrade.http.html
deleted file mode 100644
index f4020bdff8a..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-upgrade.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via fetch-request using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "fetch-request",
- "subresource_path": "/referrer-policy/generic/subresource/xhr.py",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-upgrade.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-upgrade.http.html.headers
deleted file mode 100644
index 9ce1de38843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-upgrade.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/same-origin-downgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/same-origin-downgrade.http.html
deleted file mode 100644
index 48dcc5d522e..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/same-origin-downgrade.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via iframe-tag using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "subresource_path": "/referrer-policy/generic/subresource/document.py",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/same-origin-downgrade.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/same-origin-downgrade.http.html.headers
deleted file mode 100644
index 9ce1de38843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/same-origin-downgrade.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/no-redirect/same-origin-downgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/no-redirect/same-origin-downgrade.http.html
deleted file mode 100644
index 6cc4669d988..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/no-redirect/same-origin-downgrade.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via iframe-tag using the http-rp
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "subresource_path": "/referrer-policy/generic/subresource/document.py",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/no-redirect/same-origin-downgrade.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/no-redirect/same-origin-downgrade.http.html.headers
deleted file mode 100644
index 9ce1de38843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/no-redirect/same-origin-downgrade.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-downgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-downgrade.http.html
deleted file mode 100644
index b1bacfe9bba..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-downgrade.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via iframe-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "subresource_path": "/referrer-policy/generic/subresource/document.py",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-downgrade.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-downgrade.http.html.headers
deleted file mode 100644
index 9ce1de38843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-downgrade.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-upgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-upgrade.http.html
deleted file mode 100644
index b1bacfe9bba..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-upgrade.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via iframe-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "subresource_path": "/referrer-policy/generic/subresource/document.py",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-upgrade.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-upgrade.http.html.headers
deleted file mode 100644
index 9ce1de38843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-upgrade.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/same-origin-downgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/same-origin-downgrade.http.html
deleted file mode 100644
index 08156b668c4..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/same-origin-downgrade.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via img-tag using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "img-tag",
- "subresource_path": "/referrer-policy/generic/subresource/image.py",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/same-origin-downgrade.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/same-origin-downgrade.http.html.headers
deleted file mode 100644
index 9ce1de38843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/same-origin-downgrade.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/no-redirect/same-origin-downgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/no-redirect/same-origin-downgrade.http.html
deleted file mode 100644
index ae1f44978c7..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/no-redirect/same-origin-downgrade.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via img-tag using the http-rp
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "img-tag",
- "subresource_path": "/referrer-policy/generic/subresource/image.py",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/no-redirect/same-origin-downgrade.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/no-redirect/same-origin-downgrade.http.html.headers
deleted file mode 100644
index 9ce1de38843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/no-redirect/same-origin-downgrade.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-downgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-downgrade.http.html
deleted file mode 100644
index 7b0f9d4b3b7..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-downgrade.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via img-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "img-tag",
- "subresource_path": "/referrer-policy/generic/subresource/image.py",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-downgrade.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-downgrade.http.html.headers
deleted file mode 100644
index 9ce1de38843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-downgrade.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-upgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-upgrade.http.html
deleted file mode 100644
index 7b0f9d4b3b7..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-upgrade.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via img-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "img-tag",
- "subresource_path": "/referrer-policy/generic/subresource/image.py",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-upgrade.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-upgrade.http.html.headers
deleted file mode 100644
index 9ce1de38843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-upgrade.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/same-origin-downgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/same-origin-downgrade.http.html
deleted file mode 100644
index 633eb15d97a..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/same-origin-downgrade.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via script-tag using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "subresource_path": "/referrer-policy/generic/subresource/script.py",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/same-origin-downgrade.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/same-origin-downgrade.http.html.headers
deleted file mode 100644
index 9ce1de38843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/same-origin-downgrade.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/no-redirect/same-origin-downgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/no-redirect/same-origin-downgrade.http.html
deleted file mode 100644
index b7dd2d260b2..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/no-redirect/same-origin-downgrade.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via script-tag using the http-rp
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "subresource_path": "/referrer-policy/generic/subresource/script.py",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/no-redirect/same-origin-downgrade.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/no-redirect/same-origin-downgrade.http.html.headers
deleted file mode 100644
index 9ce1de38843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/no-redirect/same-origin-downgrade.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-downgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-downgrade.http.html
deleted file mode 100644
index d968e31f462..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-downgrade.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via script-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "subresource_path": "/referrer-policy/generic/subresource/script.py",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-downgrade.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-downgrade.http.html.headers
deleted file mode 100644
index 9ce1de38843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-downgrade.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-upgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-upgrade.http.html
deleted file mode 100644
index d968e31f462..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-upgrade.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via script-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "subresource_path": "/referrer-policy/generic/subresource/script.py",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-upgrade.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-upgrade.http.html.headers
deleted file mode 100644
index 9ce1de38843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-upgrade.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/same-origin-downgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/same-origin-downgrade.http.html
deleted file mode 100644
index cde3c4dcb62..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/same-origin-downgrade.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via xhr-request using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "xhr-request",
- "subresource_path": "/referrer-policy/generic/subresource/xhr.py",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/same-origin-downgrade.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/same-origin-downgrade.http.html.headers
deleted file mode 100644
index 9ce1de38843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/same-origin-downgrade.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/no-redirect/same-origin-downgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/no-redirect/same-origin-downgrade.http.html
deleted file mode 100644
index 69e0ac3f392..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/no-redirect/same-origin-downgrade.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via xhr-request using the http-rp
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "xhr-request",
- "subresource_path": "/referrer-policy/generic/subresource/xhr.py",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/no-redirect/same-origin-downgrade.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/no-redirect/same-origin-downgrade.http.html.headers
deleted file mode 100644
index 9ce1de38843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/no-redirect/same-origin-downgrade.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-downgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-downgrade.http.html
deleted file mode 100644
index f9f5cbfc2e0..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-downgrade.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via xhr-request using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "xhr-request",
- "subresource_path": "/referrer-policy/generic/subresource/xhr.py",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-downgrade.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-downgrade.http.html.headers
deleted file mode 100644
index 9ce1de38843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-downgrade.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-upgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-upgrade.http.html
deleted file mode 100644
index f9f5cbfc2e0..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-upgrade.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via xhr-request using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "xhr-request",
- "subresource_path": "/referrer-policy/generic/subresource/xhr.py",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-upgrade.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-upgrade.http.html.headers
deleted file mode 100644
index 9ce1de38843..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-upgrade.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: origin-when-cross-origin
-Access-Control-Allow-Origin: *
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/a-tag/no-redirect/same-origin-downgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/a-tag/no-redirect/same-origin-downgrade.http.html
deleted file mode 100644
index 2111a0cf7c5..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/a-tag/no-redirect/same-origin-downgrade.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via a-tag using the meta-referrer
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "a-tag",
- "subresource_path": "/referrer-policy/generic/subresource/document.py",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/keep-origin-redirect/same-origin-downgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/keep-origin-redirect/same-origin-downgrade.http.html
deleted file mode 100644
index f0adebf34b3..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/keep-origin-redirect/same-origin-downgrade.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via fetch-request using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "fetch-request",
- "subresource_path": "/referrer-policy/generic/subresource/xhr.py",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/no-redirect/same-origin-downgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/no-redirect/same-origin-downgrade.http.html
deleted file mode 100644
index 4d5714f87f1..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/no-redirect/same-origin-downgrade.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via fetch-request using the meta-referrer
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "fetch-request",
- "subresource_path": "/referrer-policy/generic/subresource/xhr.py",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-downgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-downgrade.http.html
deleted file mode 100644
index 6578bd1e631..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-downgrade.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via fetch-request using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "fetch-request",
- "subresource_path": "/referrer-policy/generic/subresource/xhr.py",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-upgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-upgrade.http.html
deleted file mode 100644
index 6578bd1e631..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-upgrade.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via fetch-request using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "fetch-request",
- "subresource_path": "/referrer-policy/generic/subresource/xhr.py",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/same-origin-downgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/same-origin-downgrade.http.html
deleted file mode 100644
index 94802477e7b..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/same-origin-downgrade.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via iframe-tag using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "subresource_path": "/referrer-policy/generic/subresource/document.py",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/no-redirect/same-origin-downgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/no-redirect/same-origin-downgrade.http.html
deleted file mode 100644
index a4298049e50..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/no-redirect/same-origin-downgrade.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via iframe-tag using the meta-referrer
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "subresource_path": "/referrer-policy/generic/subresource/document.py",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-downgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-downgrade.http.html
deleted file mode 100644
index 548e63ea974..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-downgrade.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via iframe-tag using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "subresource_path": "/referrer-policy/generic/subresource/document.py",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-upgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-upgrade.http.html
deleted file mode 100644
index 548e63ea974..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-upgrade.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via iframe-tag using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "subresource_path": "/referrer-policy/generic/subresource/document.py",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/keep-origin-redirect/same-origin-downgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/keep-origin-redirect/same-origin-downgrade.http.html
deleted file mode 100644
index 32da6f1eaae..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/keep-origin-redirect/same-origin-downgrade.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via img-tag using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "img-tag",
- "subresource_path": "/referrer-policy/generic/subresource/image.py",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/no-redirect/same-origin-downgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/no-redirect/same-origin-downgrade.http.html
deleted file mode 100644
index c7367f70659..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/no-redirect/same-origin-downgrade.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via img-tag using the meta-referrer
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "img-tag",
- "subresource_path": "/referrer-policy/generic/subresource/image.py",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-downgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-downgrade.http.html
deleted file mode 100644
index a0e33c7205f..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-downgrade.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via img-tag using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "img-tag",
- "subresource_path": "/referrer-policy/generic/subresource/image.py",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-upgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-upgrade.http.html
deleted file mode 100644
index a0e33c7205f..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-upgrade.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via img-tag using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "img-tag",
- "subresource_path": "/referrer-policy/generic/subresource/image.py",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/keep-origin-redirect/same-origin-downgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/keep-origin-redirect/same-origin-downgrade.http.html
deleted file mode 100644
index c80a3c7e52f..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/keep-origin-redirect/same-origin-downgrade.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via script-tag using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "subresource_path": "/referrer-policy/generic/subresource/script.py",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/no-redirect/same-origin-downgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/no-redirect/same-origin-downgrade.http.html
deleted file mode 100644
index e7e65e19ec6..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/no-redirect/same-origin-downgrade.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via script-tag using the meta-referrer
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "subresource_path": "/referrer-policy/generic/subresource/script.py",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-downgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-downgrade.http.html
deleted file mode 100644
index 42ecdbc0fd8..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-downgrade.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via script-tag using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "subresource_path": "/referrer-policy/generic/subresource/script.py",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-upgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-upgrade.http.html
deleted file mode 100644
index 42ecdbc0fd8..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-upgrade.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via script-tag using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "subresource_path": "/referrer-policy/generic/subresource/script.py",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/keep-origin-redirect/same-origin-downgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/keep-origin-redirect/same-origin-downgrade.http.html
deleted file mode 100644
index c6dcc471c47..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/keep-origin-redirect/same-origin-downgrade.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via xhr-request using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "xhr-request",
- "subresource_path": "/referrer-policy/generic/subresource/xhr.py",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/no-redirect/same-origin-downgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/no-redirect/same-origin-downgrade.http.html
deleted file mode 100644
index 53505abe07c..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/no-redirect/same-origin-downgrade.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via xhr-request using the meta-referrer
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "xhr-request",
- "subresource_path": "/referrer-policy/generic/subresource/xhr.py",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-downgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-downgrade.http.html
deleted file mode 100644
index 76b1b2df5fa..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-downgrade.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via xhr-request using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "xhr-request",
- "subresource_path": "/referrer-policy/generic/subresource/xhr.py",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-upgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-upgrade.http.html
deleted file mode 100644
index 76b1b2df5fa..00000000000
--- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-upgrade.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="origin-when-cross-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
- <meta name="assert" content="The referrer URL is origin when a
- document served over http requires an https
- sub-resource via xhr-request using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "origin-when-cross-origin",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "xhr-request",
- "subresource_path": "/referrer-policy/generic/subresource/xhr.py",
- "referrer_url": "origin"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/tests/wpt/web-platform-tests/referrer-policy/spec.src.json b/tests/wpt/web-platform-tests/referrer-policy/spec.src.json
index f96eaf594e5..97fbad62043 100644
--- a/tests/wpt/web-platform-tests/referrer-policy/spec.src.json
+++ b/tests/wpt/web-platform-tests/referrer-policy/spec.src.json
@@ -242,8 +242,8 @@
{
"name": "same-origin-downgrade",
"expansion": "default",
- "source_protocol": "http",
- "target_protocol": "https",
+ "source_protocol": "https",
+ "target_protocol": "http",
"delivery_method": ["http-rp", "meta-referrer", "attr-referrer"],
"redirection": "*",
"origin": "same-origin",
diff --git a/tests/wpt/web-platform-tests/referrer-policy/spec_json.js b/tests/wpt/web-platform-tests/referrer-policy/spec_json.js
index 32a32fbc35d..d178c9f2346 100644
--- a/tests/wpt/web-platform-tests/referrer-policy/spec_json.js
+++ b/tests/wpt/web-platform-tests/referrer-policy/spec_json.js
@@ -1 +1 @@
-var SPEC_JSON = {"subresource_path": {"img-tag": "/referrer-policy/generic/subresource/image.py", "xhr-request": "/referrer-policy/generic/subresource/xhr.py", "fetch-request": "/referrer-policy/generic/subresource/xhr.py", "module-worker": "/referrer-policy/generic/subresource/worker.py", "a-tag": "/referrer-policy/generic/subresource/document.py", "area-tag": "/referrer-policy/generic/subresource/document.py", "iframe-tag": "/referrer-policy/generic/subresource/document.py", "shared-worker": "/referrer-policy/generic/subresource/shared-worker.py", "worker-request": "/referrer-policy/generic/subresource/worker.py", "script-tag": "/referrer-policy/generic/subresource/script.py"}, "test_expansion_schema": {"origin": ["same-origin", "cross-origin"], "subresource": ["iframe-tag", "img-tag", "script-tag", "a-tag", "area-tag", "xhr-request", "worker-request", "module-worker", "shared-worker", "fetch-request"], "target_protocol": ["http", "https"], "expansion": ["default", "override"], "delivery_method": ["http-rp", "meta-referrer", "attr-referrer", "rel-noreferrer"], "redirection": ["no-redirect", "keep-origin-redirect", "swap-origin-redirect"], "referrer_url": ["omitted", "origin", "stripped-referrer"], "source_protocol": ["http", "https"]}, "specification": [{"specification_url": "https://w3c.github.io/webappsec-referrer-policy/#referrer-policies", "referrer_policy": null, "title": "Referrer Policy is not explicitly defined", "test_expansion": [{"origin": "*", "name": "insecure-protocol", "target_protocol": "http", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "stripped-referrer", "source_protocol": "http", "subresource": "*"}, {"origin": "*", "name": "upgrade-protocol", "target_protocol": "https", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "stripped-referrer", "source_protocol": "http", "subresource": "*"}, {"origin": "*", "name": "downgrade-protocol", "target_protocol": "http", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "omitted", "source_protocol": "https", "subresource": "*"}, {"origin": "*", "name": "secure-protocol", "target_protocol": "https", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "stripped-referrer", "source_protocol": "https", "subresource": "*"}], "name": "unset-referrer-policy", "description": "Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."}, {"specification_url": "https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer", "referrer_policy": "no-referrer", "title": "Referrer Policy is set to 'no-referrer'", "test_expansion": [{"origin": "*", "name": "generic", "target_protocol": "*", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "omitted", "source_protocol": "*", "subresource": "*"}], "name": "no-referrer", "description": "Check that sub-resource never gets the referrer URL."}, {"specification_url": "https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade", "referrer_policy": "no-referrer-when-downgrade", "title": "Referrer Policy is set to 'no-referrer-when-downgrade'", "test_expansion": [{"origin": "*", "name": "insecure-protocol", "target_protocol": "http", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "stripped-referrer", "source_protocol": "http", "subresource": "*"}, {"origin": "*", "name": "upgrade-protocol", "target_protocol": "https", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "stripped-referrer", "source_protocol": "http", "subresource": "*"}, {"origin": "*", "name": "downgrade-protocol", "target_protocol": "http", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "omitted", "source_protocol": "https", "subresource": "*"}, {"origin": "*", "name": "secure-protocol", "target_protocol": "https", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "stripped-referrer", "source_protocol": "https", "subresource": "*"}], "name": "no-referrer-when-downgrade", "description": "Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."}, {"specification_url": "https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin", "referrer_policy": "origin", "title": "Referrer Policy is set to 'origin'", "test_expansion": [{"origin": "*", "name": "generic", "target_protocol": "*", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "origin", "source_protocol": "*", "subresource": "*"}], "name": "origin", "description": "Check that all subresources in all casses get only the origin portion of the referrer URL."}, {"specification_url": "https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin", "referrer_policy": "same-origin", "title": "Referrer Policy is set to 'same-origin'", "test_expansion": [{"origin": "same-origin", "name": "same-origin-insecure", "target_protocol": "http", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "stripped-referrer", "source_protocol": "http", "subresource": "*"}, {"origin": "same-origin", "name": "same-origin-secure-default", "target_protocol": "https", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "stripped-referrer", "source_protocol": "https", "subresource": "*"}, {"origin": "same-origin", "name": "same-origin-insecure", "target_protocol": "*", "expansion": "override", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "swap-origin-redirect", "referrer_url": "omitted", "source_protocol": "*", "subresource": "*"}, {"origin": "cross-origin", "name": "cross-origin", "target_protocol": "*", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "omitted", "source_protocol": "*", "subresource": "*"}], "name": "same-origin", "description": "Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."}, {"specification_url": "https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin", "referrer_policy": "origin-when-cross-origin", "title": "Referrer Policy is set to 'origin-when-cross-origin'", "test_expansion": [{"origin": "same-origin", "name": "same-origin-insecure", "target_protocol": "http", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "stripped-referrer", "source_protocol": "http", "subresource": "*"}, {"origin": "same-origin", "name": "same-origin-secure-default", "target_protocol": "https", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "stripped-referrer", "source_protocol": "https", "subresource": "*"}, {"origin": "same-origin", "name": "same-origin-upgrade", "target_protocol": "https", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "origin", "source_protocol": "http", "subresource": "*"}, {"origin": "same-origin", "name": "same-origin-downgrade", "target_protocol": "https", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "origin", "source_protocol": "http", "subresource": "*"}, {"origin": "same-origin", "name": "same-origin-insecure", "target_protocol": "*", "expansion": "override", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "swap-origin-redirect", "referrer_url": "origin", "source_protocol": "*", "subresource": "*"}, {"origin": "cross-origin", "name": "cross-origin", "target_protocol": "*", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "origin", "source_protocol": "*", "subresource": "*"}], "name": "origin-when-cross-origin", "description": "Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."}, {"specification_url": "https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin", "referrer_policy": "strict-origin", "title": "Referrer Policy is set to 'strict-origin'", "test_expansion": [{"origin": "*", "name": "insecure-protocol", "target_protocol": "http", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "origin", "source_protocol": "http", "subresource": "*"}, {"origin": "*", "name": "upgrade-protocol", "target_protocol": "https", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "origin", "source_protocol": "http", "subresource": "*"}, {"origin": "*", "name": "downgrade-protocol", "target_protocol": "http", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "omitted", "source_protocol": "https", "subresource": "*"}, {"origin": "*", "name": "secure-protocol", "target_protocol": "https", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "origin", "source_protocol": "https", "subresource": "*"}], "name": "strict-origin", "description": "Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."}, {"specification_url": "https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin", "referrer_policy": "strict-origin-when-cross-origin", "title": "Referrer Policy is set to 'strict-origin-when-cross-origin'", "test_expansion": [{"origin": "same-origin", "name": "same-insecure", "target_protocol": "http", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "stripped-referrer", "source_protocol": "http", "subresource": "*"}, {"origin": "same-origin", "name": "same-insecure", "target_protocol": "http", "expansion": "override", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "swap-origin-redirect", "referrer_url": "origin", "source_protocol": "http", "subresource": "*"}, {"origin": "cross-origin", "name": "cross-insecure", "target_protocol": "http", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "origin", "source_protocol": "http", "subresource": "*"}, {"origin": "*", "name": "upgrade-protocol", "target_protocol": "https", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "origin", "source_protocol": "http", "subresource": "*"}, {"origin": "*", "name": "downgrade-protocol", "target_protocol": "http", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "omitted", "source_protocol": "https", "subresource": "*"}, {"origin": "same-origin", "name": "same-secure", "target_protocol": "https", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "stripped-referrer", "source_protocol": "https", "subresource": "*"}, {"origin": "same-origin", "name": "same-secure", "target_protocol": "https", "expansion": "override", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "swap-origin-redirect", "referrer_url": "origin", "source_protocol": "https", "subresource": "*"}, {"origin": "cross-origin", "name": "cross-secure", "target_protocol": "https", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "origin", "source_protocol": "https", "subresource": "*"}], "name": "strict-origin-when-cross-origin", "description": "Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."}, {"specification_url": "https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url", "referrer_policy": "unsafe-url", "title": "Referrer Policy is set to 'unsafe-url'", "test_expansion": [{"origin": "*", "name": "generic", "target_protocol": "*", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "stripped-referrer", "source_protocol": "*", "subresource": "*"}], "name": "unsafe-url", "description": "Check that all sub-resources get the stripped referrer URL."}], "referrer_policy_schema": [null, "no-referrer", "no-referrer-when-downgrade", "same-origin", "origin", "origin-when-cross-origin", "strict-origin", "strict-origin-when-cross-origin", "unsafe-url"], "excluded_tests": [{"origin": "cross-origin", "name": "cross-origin-workers", "target_protocol": "*", "expansion": "*", "delivery_method": "*", "redirection": "*", "referrer_url": "*", "source_protocol": "*", "subresource": ["worker-request", "module-worker", "shared-worker"]}, {"origin": "*", "name": "upgraded-protocol-workers", "target_protocol": "https", "expansion": "*", "delivery_method": "*", "redirection": "*", "referrer_url": "*", "source_protocol": "http", "subresource": ["worker-request", "module-worker", "shared-worker"]}, {"origin": "*", "name": "mixed-content-insecure-subresources", "target_protocol": "http", "expansion": "*", "delivery_method": "*", "redirection": "*", "referrer_url": "*", "source_protocol": "https", "subresource": "*"}, {"origin": "*", "name": "elements-not-supporting-attr-referrer", "target_protocol": "*", "expansion": "*", "delivery_method": ["attr-referrer"], "redirection": "*", "referrer_url": "*", "source_protocol": "*", "subresource": ["xhr-request", "worker-request", "module-worker", "shared-worker", "fetch-request"]}, {"origin": "*", "name": "elements-not-supporting-rel-noreferrer", "target_protocol": "*", "expansion": "*", "delivery_method": ["rel-noreferrer"], "redirection": "*", "referrer_url": "*", "source_protocol": "*", "subresource": ["iframe-tag", "img-tag", "script-tag", "xhr-request", "worker-request", "module-worker", "shared-worker", "fetch-request", "area-tag"]}, {"origin": "*", "name": "area-tag", "target_protocol": "*", "expansion": "*", "delivery_method": "*", "redirection": "*", "referrer_url": "*", "source_protocol": "*", "subresource": "area-tag"}, {"origin": "*", "name": "worker-requests-with-swap-origin-redirect", "target_protocol": "*", "expansion": "*", "delivery_method": "*", "redirection": "swap-origin-redirect", "referrer_url": "*", "source_protocol": "*", "subresource": ["worker-request", "module-worker", "shared-worker"]}, {"origin": "*", "name": "overhead-for-redirection", "target_protocol": "*", "expansion": "*", "delivery_method": "*", "redirection": ["keep-origin-redirect", "swap-origin-redirect"], "referrer_url": "*", "source_protocol": "*", "subresource": ["a-tag", "area-tag"]}, {"origin": "*", "name": "source-https-unsupported-by-web-platform-tests-runners", "target_protocol": "*", "expansion": "*", "delivery_method": "*", "redirection": "*", "referrer_url": "*", "source_protocol": "https", "subresource": "*"}]};
+var SPEC_JSON = {"subresource_path": {"img-tag": "/referrer-policy/generic/subresource/image.py", "xhr-request": "/referrer-policy/generic/subresource/xhr.py", "fetch-request": "/referrer-policy/generic/subresource/xhr.py", "module-worker": "/referrer-policy/generic/subresource/worker.py", "a-tag": "/referrer-policy/generic/subresource/document.py", "area-tag": "/referrer-policy/generic/subresource/document.py", "iframe-tag": "/referrer-policy/generic/subresource/document.py", "shared-worker": "/referrer-policy/generic/subresource/shared-worker.py", "worker-request": "/referrer-policy/generic/subresource/worker.py", "script-tag": "/referrer-policy/generic/subresource/script.py"}, "test_expansion_schema": {"origin": ["same-origin", "cross-origin"], "subresource": ["iframe-tag", "img-tag", "script-tag", "a-tag", "area-tag", "xhr-request", "worker-request", "module-worker", "shared-worker", "fetch-request"], "target_protocol": ["http", "https"], "expansion": ["default", "override"], "delivery_method": ["http-rp", "meta-referrer", "attr-referrer", "rel-noreferrer"], "redirection": ["no-redirect", "keep-origin-redirect", "swap-origin-redirect"], "referrer_url": ["omitted", "origin", "stripped-referrer"], "source_protocol": ["http", "https"]}, "specification": [{"specification_url": "https://w3c.github.io/webappsec-referrer-policy/#referrer-policies", "referrer_policy": null, "title": "Referrer Policy is not explicitly defined", "test_expansion": [{"origin": "*", "name": "insecure-protocol", "target_protocol": "http", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "stripped-referrer", "source_protocol": "http", "subresource": "*"}, {"origin": "*", "name": "upgrade-protocol", "target_protocol": "https", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "stripped-referrer", "source_protocol": "http", "subresource": "*"}, {"origin": "*", "name": "downgrade-protocol", "target_protocol": "http", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "omitted", "source_protocol": "https", "subresource": "*"}, {"origin": "*", "name": "secure-protocol", "target_protocol": "https", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "stripped-referrer", "source_protocol": "https", "subresource": "*"}], "name": "unset-referrer-policy", "description": "Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."}, {"specification_url": "https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer", "referrer_policy": "no-referrer", "title": "Referrer Policy is set to 'no-referrer'", "test_expansion": [{"origin": "*", "name": "generic", "target_protocol": "*", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "omitted", "source_protocol": "*", "subresource": "*"}], "name": "no-referrer", "description": "Check that sub-resource never gets the referrer URL."}, {"specification_url": "https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade", "referrer_policy": "no-referrer-when-downgrade", "title": "Referrer Policy is set to 'no-referrer-when-downgrade'", "test_expansion": [{"origin": "*", "name": "insecure-protocol", "target_protocol": "http", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "stripped-referrer", "source_protocol": "http", "subresource": "*"}, {"origin": "*", "name": "upgrade-protocol", "target_protocol": "https", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "stripped-referrer", "source_protocol": "http", "subresource": "*"}, {"origin": "*", "name": "downgrade-protocol", "target_protocol": "http", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "omitted", "source_protocol": "https", "subresource": "*"}, {"origin": "*", "name": "secure-protocol", "target_protocol": "https", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "stripped-referrer", "source_protocol": "https", "subresource": "*"}], "name": "no-referrer-when-downgrade", "description": "Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."}, {"specification_url": "https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin", "referrer_policy": "origin", "title": "Referrer Policy is set to 'origin'", "test_expansion": [{"origin": "*", "name": "generic", "target_protocol": "*", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "origin", "source_protocol": "*", "subresource": "*"}], "name": "origin", "description": "Check that all subresources in all casses get only the origin portion of the referrer URL."}, {"specification_url": "https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin", "referrer_policy": "same-origin", "title": "Referrer Policy is set to 'same-origin'", "test_expansion": [{"origin": "same-origin", "name": "same-origin-insecure", "target_protocol": "http", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "stripped-referrer", "source_protocol": "http", "subresource": "*"}, {"origin": "same-origin", "name": "same-origin-secure-default", "target_protocol": "https", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "stripped-referrer", "source_protocol": "https", "subresource": "*"}, {"origin": "same-origin", "name": "same-origin-insecure", "target_protocol": "*", "expansion": "override", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "swap-origin-redirect", "referrer_url": "omitted", "source_protocol": "*", "subresource": "*"}, {"origin": "cross-origin", "name": "cross-origin", "target_protocol": "*", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "omitted", "source_protocol": "*", "subresource": "*"}], "name": "same-origin", "description": "Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."}, {"specification_url": "https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin", "referrer_policy": "origin-when-cross-origin", "title": "Referrer Policy is set to 'origin-when-cross-origin'", "test_expansion": [{"origin": "same-origin", "name": "same-origin-insecure", "target_protocol": "http", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "stripped-referrer", "source_protocol": "http", "subresource": "*"}, {"origin": "same-origin", "name": "same-origin-secure-default", "target_protocol": "https", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "stripped-referrer", "source_protocol": "https", "subresource": "*"}, {"origin": "same-origin", "name": "same-origin-upgrade", "target_protocol": "https", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "origin", "source_protocol": "http", "subresource": "*"}, {"origin": "same-origin", "name": "same-origin-downgrade", "target_protocol": "http", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "origin", "source_protocol": "https", "subresource": "*"}, {"origin": "same-origin", "name": "same-origin-insecure", "target_protocol": "*", "expansion": "override", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "swap-origin-redirect", "referrer_url": "origin", "source_protocol": "*", "subresource": "*"}, {"origin": "cross-origin", "name": "cross-origin", "target_protocol": "*", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "origin", "source_protocol": "*", "subresource": "*"}], "name": "origin-when-cross-origin", "description": "Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."}, {"specification_url": "https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin", "referrer_policy": "strict-origin", "title": "Referrer Policy is set to 'strict-origin'", "test_expansion": [{"origin": "*", "name": "insecure-protocol", "target_protocol": "http", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "origin", "source_protocol": "http", "subresource": "*"}, {"origin": "*", "name": "upgrade-protocol", "target_protocol": "https", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "origin", "source_protocol": "http", "subresource": "*"}, {"origin": "*", "name": "downgrade-protocol", "target_protocol": "http", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "omitted", "source_protocol": "https", "subresource": "*"}, {"origin": "*", "name": "secure-protocol", "target_protocol": "https", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "origin", "source_protocol": "https", "subresource": "*"}], "name": "strict-origin", "description": "Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."}, {"specification_url": "https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin", "referrer_policy": "strict-origin-when-cross-origin", "title": "Referrer Policy is set to 'strict-origin-when-cross-origin'", "test_expansion": [{"origin": "same-origin", "name": "same-insecure", "target_protocol": "http", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "stripped-referrer", "source_protocol": "http", "subresource": "*"}, {"origin": "same-origin", "name": "same-insecure", "target_protocol": "http", "expansion": "override", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "swap-origin-redirect", "referrer_url": "origin", "source_protocol": "http", "subresource": "*"}, {"origin": "cross-origin", "name": "cross-insecure", "target_protocol": "http", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "origin", "source_protocol": "http", "subresource": "*"}, {"origin": "*", "name": "upgrade-protocol", "target_protocol": "https", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "origin", "source_protocol": "http", "subresource": "*"}, {"origin": "*", "name": "downgrade-protocol", "target_protocol": "http", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "omitted", "source_protocol": "https", "subresource": "*"}, {"origin": "same-origin", "name": "same-secure", "target_protocol": "https", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "stripped-referrer", "source_protocol": "https", "subresource": "*"}, {"origin": "same-origin", "name": "same-secure", "target_protocol": "https", "expansion": "override", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "swap-origin-redirect", "referrer_url": "origin", "source_protocol": "https", "subresource": "*"}, {"origin": "cross-origin", "name": "cross-secure", "target_protocol": "https", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "origin", "source_protocol": "https", "subresource": "*"}], "name": "strict-origin-when-cross-origin", "description": "Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."}, {"specification_url": "https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url", "referrer_policy": "unsafe-url", "title": "Referrer Policy is set to 'unsafe-url'", "test_expansion": [{"origin": "*", "name": "generic", "target_protocol": "*", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "stripped-referrer", "source_protocol": "*", "subresource": "*"}], "name": "unsafe-url", "description": "Check that all sub-resources get the stripped referrer URL."}], "referrer_policy_schema": [null, "no-referrer", "no-referrer-when-downgrade", "same-origin", "origin", "origin-when-cross-origin", "strict-origin", "strict-origin-when-cross-origin", "unsafe-url"], "excluded_tests": [{"origin": "cross-origin", "name": "cross-origin-workers", "target_protocol": "*", "expansion": "*", "delivery_method": "*", "redirection": "*", "referrer_url": "*", "source_protocol": "*", "subresource": ["worker-request", "module-worker", "shared-worker"]}, {"origin": "*", "name": "upgraded-protocol-workers", "target_protocol": "https", "expansion": "*", "delivery_method": "*", "redirection": "*", "referrer_url": "*", "source_protocol": "http", "subresource": ["worker-request", "module-worker", "shared-worker"]}, {"origin": "*", "name": "mixed-content-insecure-subresources", "target_protocol": "http", "expansion": "*", "delivery_method": "*", "redirection": "*", "referrer_url": "*", "source_protocol": "https", "subresource": "*"}, {"origin": "*", "name": "elements-not-supporting-attr-referrer", "target_protocol": "*", "expansion": "*", "delivery_method": ["attr-referrer"], "redirection": "*", "referrer_url": "*", "source_protocol": "*", "subresource": ["xhr-request", "worker-request", "module-worker", "shared-worker", "fetch-request"]}, {"origin": "*", "name": "elements-not-supporting-rel-noreferrer", "target_protocol": "*", "expansion": "*", "delivery_method": ["rel-noreferrer"], "redirection": "*", "referrer_url": "*", "source_protocol": "*", "subresource": ["iframe-tag", "img-tag", "script-tag", "xhr-request", "worker-request", "module-worker", "shared-worker", "fetch-request", "area-tag"]}, {"origin": "*", "name": "area-tag", "target_protocol": "*", "expansion": "*", "delivery_method": "*", "redirection": "*", "referrer_url": "*", "source_protocol": "*", "subresource": "area-tag"}, {"origin": "*", "name": "worker-requests-with-swap-origin-redirect", "target_protocol": "*", "expansion": "*", "delivery_method": "*", "redirection": "swap-origin-redirect", "referrer_url": "*", "source_protocol": "*", "subresource": ["worker-request", "module-worker", "shared-worker"]}, {"origin": "*", "name": "overhead-for-redirection", "target_protocol": "*", "expansion": "*", "delivery_method": "*", "redirection": ["keep-origin-redirect", "swap-origin-redirect"], "referrer_url": "*", "source_protocol": "*", "subresource": ["a-tag", "area-tag"]}, {"origin": "*", "name": "source-https-unsupported-by-web-platform-tests-runners", "target_protocol": "*", "expansion": "*", "delivery_method": "*", "redirection": "*", "referrer_url": "*", "source_protocol": "https", "subresource": "*"}]};
diff --git a/tests/wpt/web-platform-tests/shadow-dom/offsetParent-across-shadow-boundaries.html b/tests/wpt/web-platform-tests/shadow-dom/offsetParent-across-shadow-boundaries.html
new file mode 100644
index 00000000000..5491e212133
--- /dev/null
+++ b/tests/wpt/web-platform-tests/shadow-dom/offsetParent-across-shadow-boundaries.html
@@ -0,0 +1,190 @@
+<!DOCTYPE html>
+<html>
+<head>
+<meta name="author" title="Ryosuke Niwa" href="mailto:rniwa@webkit.org">
+<meta name="assert" content="offsetParent should only return nodes that are shadow including ancestor">
+<link rel="help" href="https://drafts.csswg.org/cssom-view/#dom-htmlelement-offsetparent">
+<link rel="help" href="https://dom.spec.whatwg.org/#concept-shadow-including-inclusive-ancestor">
+<script src="/resources/testharness.js"></script>
+<script src="/resources/testharnessreport.js"></script>
+<script src="resources/event-path-test-helpers.js"></script>
+</head>
+<body>
+<div id="log"></div>
+<div id="container" style="position: relative"></div>
+<script>
+
+const container = document.getElementById('container');
+
+function testOffsetParentInShadowTree(mode) {
+ test(function () {
+ const host = document.createElement('div');
+ container.appendChild(host);
+ this.add_cleanup(() => host.remove());
+ const shadowRoot = host.attachShadow({mode});
+ shadowRoot.innerHTML = '<div id="relativeParent" style="position: relative; padding-left: 100px; padding-top: 70px;"><div id="target"></div></div>';
+ const relativeParent = shadowRoot.getElementById('relativeParent');
+
+ assert_true(relativeParent instanceof HTMLDivElement);
+ const target = shadowRoot.getElementById('target');
+ assert_equals(target.offsetParent, relativeParent);
+ assert_equals(target.offsetLeft, 100);
+ assert_equals(target.offsetTop, 70);
+ }, `offsetParent must return the offset parent in the same shadow tree of ${mode} mode`);
+}
+
+testOffsetParentInShadowTree('open');
+testOffsetParentInShadowTree('closed');
+
+function testOffsetParentInNestedShadowTrees(mode) {
+ test(function () {
+ const outerHost = document.createElement('section');
+ container.appendChild(outerHost);
+ this.add_cleanup(() => outerHost.remove());
+ const outerShadow = outerHost.attachShadow({mode});
+ outerShadow.innerHTML = '<section id="outerParent" style="position: absolute; top: 50px; left: 50px;"></section>';
+
+ const innerHost = document.createElement('div');
+ outerShadow.firstChild.appendChild(innerHost);
+ const innerShadow = innerHost.attachShadow({mode});
+ innerShadow.innerHTML = '<div id="innerParent" style="position: relative; padding-left: 60px; padding-top: 40px;"><div id="target"></div></div>';
+ const innerParent = innerShadow.getElementById('innerParent');
+
+ const target = innerShadow.getElementById('target');
+ assert_true(innerParent instanceof HTMLDivElement);
+ assert_equals(target.offsetParent, innerParent);
+ assert_equals(target.offsetLeft, 60);
+ assert_equals(target.offsetTop, 40);
+
+ outerHost.remove();
+ }, `offsetParent must return the offset parent in the same shadow tree of ${mode} mode even when nested`);
+}
+
+testOffsetParentInNestedShadowTrees('open');
+testOffsetParentInNestedShadowTrees('closed');
+
+function testOffsetParentOnElementAssignedToSlotInsideOffsetParent(mode) {
+ test(function () {
+ const host = document.createElement('div');
+ host.innerHTML = '<div id="target"></div>'
+ container.appendChild(host);
+ this.add_cleanup(() => host.remove());
+ const shadowRoot = host.attachShadow({mode});
+ shadowRoot.innerHTML = '<div style="position: relative; padding-left: 85px; padding-top: 45px;"><slot></slot></div>';
+ const target = host.querySelector('#target');
+ assert_equals(target.offsetParent, container);
+ assert_equals(target.offsetLeft, 85);
+ assert_equals(target.offsetTop, 45);
+ }, `offsetParent must skip offset parents of an element when the context object is assigned to a slot in a shadow tree of ${mode} mode`);
+}
+
+testOffsetParentOnElementAssignedToSlotInsideOffsetParent('open');
+testOffsetParentOnElementAssignedToSlotInsideOffsetParent('closed');
+
+function testOffsetParentOnElementAssignedToSlotInsideNestedOffsetParents(mode) {
+ test(function () {
+ const host = document.createElement('div');
+ host.innerHTML = '<div id="target" style="border:solid 1px blue;">hi</div>';
+ const previousBlock = document.createElement('div');
+ previousBlock.style.height = '12px';
+ container.append(previousBlock, host);
+ this.add_cleanup(() => { container.innerHTML = ''; });
+ const shadowRoot = host.attachShadow({mode});
+ shadowRoot.innerHTML = '<section style="position: relative; margin-left: 20px; margin-top: 100px; background: #ccc"><div style="position: absolute; top: 10px; left: 10px;"><slot></slot></div></section>';
+ const target = host.querySelector('#target');
+ assert_equals(target.offsetParent, container);
+ assert_equals(target.offsetLeft, 30);
+ assert_equals(target.offsetTop, 122);
+ }, `offsetParent must skip multiple offset parents of an element when the context object is assigned to a slot in a shadow tree of ${mode} mode`);
+}
+
+testOffsetParentOnElementAssignedToSlotInsideNestedOffsetParents('open');
+testOffsetParentOnElementAssignedToSlotInsideNestedOffsetParents('closed');
+
+function testOffsetParentOnElementAssignedToSlotInsideNestedShadowTrees(mode) {
+ test(function () {
+ const outerHost = document.createElement('section');
+ outerHost.innerHTML = '<div id="target"></div>';
+ container.appendChild(outerHost);
+ this.add_cleanup(() => outerHost.remove());
+ const outerShadow = outerHost.attachShadow({mode});
+ outerShadow.innerHTML = '<section style="position: absolute; top: 40px; left: 50px;"><div id="innerHost"><slot></slot></div></section>';
+
+ const innerShadow = outerShadow.getElementById('innerHost').attachShadow({mode});
+ innerShadow.innerHTML = '<div style="position: absolute; top: 200px; margin-left: 100px;"><slot></slot></div>';
+
+ const target = outerHost.querySelector('#target');
+ assert_equals(target.offsetParent, container);
+ assert_equals(target.offsetLeft, 150);
+ assert_equals(target.offsetTop, 240);
+ outerHost.remove();
+ }, `offsetParent must skip offset parents of an element when the context object is assigned to a slot in nested shadow trees of ${mode} mode`);
+}
+
+testOffsetParentOnElementAssignedToSlotInsideNestedShadowTrees('open');
+testOffsetParentOnElementAssignedToSlotInsideNestedShadowTrees('closed');
+
+function testOffsetParentOnElementInsideShadowTreeWithoutOffsetParent(mode) {
+ test(function () {
+ const outerHost = document.createElement('section');
+ container.appendChild(outerHost);
+ this.add_cleanup(() => outerHost.remove());
+ const outerShadow = outerHost.attachShadow({mode});
+ outerShadow.innerHTML = '<div id="innerHost"><div id="target"></div></div>';
+
+ const innerShadow = outerShadow.getElementById('innerHost').attachShadow({mode});
+ innerShadow.innerHTML = '<div style="position: absolute; top: 23px; left: 24px;"><slot></slot></div>';
+
+ const target = outerShadow.querySelector('#target');
+ assert_equals(target.offsetParent, container);
+ assert_equals(target.offsetLeft, 24);
+ assert_equals(target.offsetTop, 23);
+ }, `offsetParent must find the first offset parent which is a shadow-including ancestor of the context object even some shadow tree of ${mode} mode did not have any offset parent`);
+}
+
+testOffsetParentOnElementInsideShadowTreeWithoutOffsetParent('open');
+testOffsetParentOnElementInsideShadowTreeWithoutOffsetParent('closed');
+
+function testOffsetParentOnUnassignedChild(mode) {
+ test(function () {
+ const host = document.createElement('section');
+ host.innerHTML = '<div id="target"></div>';
+ this.add_cleanup(() => host.remove());
+ container.appendChild(host);
+ const shadowRoot = host.attachShadow({mode});
+ shadowRoot.innerHTML = '<section style="position: absolute; top: 50px; left: 50px;">content</section>';
+ const target = host.querySelector('#target');
+ assert_equals(target.offsetParent, null);
+ assert_equals(target.offsetLeft, 0);
+ assert_equals(target.offsetTop, 0);
+ }, `offsetParent must return null on a child element of a shadow host for the shadow tree in ${mode} mode which is not assigned to any slot`);
+}
+
+testOffsetParentOnUnassignedChild('open');
+testOffsetParentOnUnassignedChild('closed');
+
+function testOffsetParentOnAssignedChildNotInFlatTree(mode) {
+ test(function () {
+ const outerHost = document.createElement('section');
+ outerHost.innerHTML = '<div id="target"></div>';
+ container.appendChild(outerHost);
+ this.add_cleanup(() => outerHost.remove());
+ const outerShadow = outerHost.attachShadow({mode});
+ outerShadow.innerHTML = '<div id="innerHost"><div style="position: absolute; top: 50px; left: 50px;"><slot></slot></div></div>';
+
+ const innerShadow = outerShadow.getElementById('innerHost').attachShadow({mode});
+ innerShadow.innerHTML = '<div>content</div>';
+
+ const target = outerHost.querySelector('#target');
+ assert_equals(target.offsetParent, null);
+ assert_equals(target.offsetLeft, 0);
+ assert_equals(target.offsetTop, 0);
+ }, `offsetParent must return null on a child element of a shadow host for the shadow tree in ${mode} mode which is not in the flat tree`);
+}
+
+testOffsetParentOnAssignedChildNotInFlatTree('open');
+testOffsetParentOnAssignedChildNotInFlatTree('closed');
+
+</script>
+</body>
+</html>
diff --git a/tests/wpt/web-platform-tests/signed-exchange/check-cert-request.tentative.html b/tests/wpt/web-platform-tests/signed-exchange/check-cert-request.tentative.html
new file mode 100644
index 00000000000..5a89066c012
--- /dev/null
+++ b/tests/wpt/web-platform-tests/signed-exchange/check-cert-request.tentative.html
@@ -0,0 +1,17 @@
+<!DOCTYPE html>
+<title>Verify that certificate request has correct parameters.</title>
+<script src="/resources/testharness.js"></script>
+<script src="/resources/testharnessreport.js"></script>
+<script src="/common/get-host-info.sub.js"></script>
+<script src="./resources/sxg-util.js"></script>
+<body>
+<script>
+promise_test(async (t) => {
+ const sxgUrl = get_host_info().HTTPS_ORIGIN + '/signed-exchange/resources/check-cert-request.sxg';
+ const message = await openSXGInIframeAndWaitForMessage(t, sxgUrl);
+ assert_equals(message.location, innerURLOrigin() + '/signed-exchange/resources/inner-url.html');
+ assert_false(message.is_fallback);
+}, 'Verify that certificate request has correct parameters.');
+
+</script>
+</body>
diff --git a/tests/wpt/web-platform-tests/signed-exchange/resources/check-cert-request.py b/tests/wpt/web-platform-tests/signed-exchange/resources/check-cert-request.py
new file mode 100644
index 00000000000..ce95f0699eb
--- /dev/null
+++ b/tests/wpt/web-platform-tests/signed-exchange/resources/check-cert-request.py
@@ -0,0 +1,11 @@
+import os
+
+def main(request, response):
+ CertChainMimeType = "application/cert-chain+cbor"
+
+ if request.headers.get("Accept") != CertChainMimeType:
+ return 400, [], "Bad Request"
+
+ path = os.path.join(os.path.dirname(__file__), "127.0.0.1.sxg.pem.cbor")
+ body = open(path, "rb").read()
+ return 200, [("Content-Type", CertChainMimeType)], body
diff --git a/tests/wpt/web-platform-tests/signed-exchange/resources/check-cert-request.sxg b/tests/wpt/web-platform-tests/signed-exchange/resources/check-cert-request.sxg
new file mode 100644
index 00000000000..05f1646cfeb
--- /dev/null
+++ b/tests/wpt/web-platform-tests/signed-exchange/resources/check-cert-request.sxg
Binary files differ
diff --git a/tests/wpt/web-platform-tests/signed-exchange/resources/check-cert-request.sxg.headers b/tests/wpt/web-platform-tests/signed-exchange/resources/check-cert-request.sxg.headers
new file mode 100644
index 00000000000..ca41178420c
--- /dev/null
+++ b/tests/wpt/web-platform-tests/signed-exchange/resources/check-cert-request.sxg.headers
@@ -0,0 +1,2 @@
+Content-Type: application/signed-exchange;v=b2
+X-Content-Type-Options: nosniff
diff --git a/tests/wpt/web-platform-tests/signed-exchange/resources/generate-test-sxgs.sh b/tests/wpt/web-platform-tests/signed-exchange/resources/generate-test-sxgs.sh
index a31ce6810d3..8359a137b8f 100755
--- a/tests/wpt/web-platform-tests/signed-exchange/resources/generate-test-sxgs.sh
+++ b/tests/wpt/web-platform-tests/signed-exchange/resources/generate-test-sxgs.sh
@@ -38,6 +38,21 @@ gen-signedexchange \
-o sxg-location.sxg \
-miRecordSize 100
+# For check-cert-request.tentative.html
+gen-signedexchange \
+ -version 1b2 \
+ -uri $inner_url_origin/signed-exchange/resources/inner-url.html \
+ -status 200 \
+ -content sxg-location.html \
+ -certificate $certfile \
+ -certUrl $cert_url_origin/signed-exchange/resources/check-cert-request.py \
+ -validityUrl $inner_url_origin/signed-exchange/resources/resource.validity.msg \
+ -privateKey $keyfile \
+ -date 2018-04-01T00:00:00Z \
+ -expire 168h \
+ -o check-cert-request.sxg \
+ -miRecordSize 100
+
# Request method is HEAD.
gen-signedexchange \
-version 1b2 \
@@ -148,4 +163,20 @@ gen-signedexchange \
-o sxg-inner-url-bom.sxg \
-miRecordSize 100
+# Response has Cache-Control: no-store header.
+gen-signedexchange \
+ -version 1b2 \
+ -uri $inner_url_origin/signed-exchange/resources/inner-url.html \
+ -status 200 \
+ -responseHeader "Cache-Control: no-store" \
+ -content sxg-location.html \
+ -certificate $certfile \
+ -certUrl $cert_url_origin/signed-exchange/resources/$certfile.cbor \
+ -validityUrl $inner_url_origin/signed-exchange/resources/resource.validity.msg \
+ -privateKey $keyfile \
+ -date 2018-04-01T00:00:00Z \
+ -expire 168h \
+ -o sxg-noncacheable.sxg \
+ -miRecordSize 100
+
rm -fr $tmpdir
diff --git a/tests/wpt/web-platform-tests/signed-exchange/resources/sxg-noncacheable.sxg b/tests/wpt/web-platform-tests/signed-exchange/resources/sxg-noncacheable.sxg
new file mode 100644
index 00000000000..38be1eeb3aa
--- /dev/null
+++ b/tests/wpt/web-platform-tests/signed-exchange/resources/sxg-noncacheable.sxg
Binary files differ
diff --git a/tests/wpt/web-platform-tests/signed-exchange/resources/sxg-noncacheable.sxg.headers b/tests/wpt/web-platform-tests/signed-exchange/resources/sxg-noncacheable.sxg.headers
new file mode 100644
index 00000000000..ca41178420c
--- /dev/null
+++ b/tests/wpt/web-platform-tests/signed-exchange/resources/sxg-noncacheable.sxg.headers
@@ -0,0 +1,2 @@
+Content-Type: application/signed-exchange;v=b2
+X-Content-Type-Options: nosniff
diff --git a/tests/wpt/web-platform-tests/signed-exchange/sxg-noncacheable.tentative.html b/tests/wpt/web-platform-tests/signed-exchange/sxg-noncacheable.tentative.html
new file mode 100644
index 00000000000..82c9fb0d029
--- /dev/null
+++ b/tests/wpt/web-platform-tests/signed-exchange/sxg-noncacheable.tentative.html
@@ -0,0 +1,17 @@
+<!DOCTYPE html>
+<title>Loading SignedHTTPExchange with non-cacheable response must fail</title>
+<script src="/resources/testharness.js"></script>
+<script src="/resources/testharnessreport.js"></script>
+<script src="/common/get-host-info.sub.js"></script>
+<script src="./resources/sxg-util.js"></script>
+<body>
+<script>
+promise_test(async (t) => {
+ const sxgUrl = get_host_info().HTTPS_ORIGIN + '/signed-exchange/resources/sxg-noncacheable.sxg';
+ const message = await openSXGInIframeAndWaitForMessage(t, sxgUrl);
+ assert_equals(message.location, innerURLOrigin() + '/signed-exchange/resources/inner-url.html');
+ assert_true(message.is_fallback);
+}, 'Loading SignedHTTPExchange with non-cacheable response must fail');
+
+</script>
+</body>
diff --git a/tests/wpt/web-platform-tests/tools/wptrunner/wptrunner/executors/executormarionette.py b/tests/wpt/web-platform-tests/tools/wptrunner/wptrunner/executors/executormarionette.py
index d471b4ed660..d69e998e2c3 100644
--- a/tests/wpt/web-platform-tests/tools/wptrunner/wptrunner/executors/executormarionette.py
+++ b/tests/wpt/web-platform-tests/tools/wptrunner/wptrunner/executors/executormarionette.py
@@ -158,10 +158,9 @@ class MarionetteTestharnessProtocolPart(TestharnessProtocolPart):
for handle in handles:
try:
- self.dismiss_alert(lambda: self.marionette.switch_to_window(handle))
- self.marionette.switch_to_window(handle)
self.logger.info("Closing window %s" % handle)
- self.marionette.close()
+ self.marionette.switch_to_window(handle)
+ self.dismiss_alert(lambda: self.marionette.close())
except errors.NoSuchWindowException:
# We might have raced with the previous test to close this
# window, skip it.
diff --git a/tests/wpt/web-platform-tests/upgrade-insecure-requests/support/testharness-helper.sub.js b/tests/wpt/web-platform-tests/upgrade-insecure-requests/support/testharness-helper.sub.js
index 383506a1437..8bf576c2abd 100644
--- a/tests/wpt/web-platform-tests/upgrade-insecure-requests/support/testharness-helper.sub.js
+++ b/tests/wpt/web-platform-tests/upgrade-insecure-requests/support/testharness-helper.sub.js
@@ -39,7 +39,7 @@ function generateURL(host, protocol, resourceType) {
}
function generateRedirect(host, protocol, target) {
- var url = "http://{{host}}:{{ports[https][0]}}/common/redirect.py?location=" + encodeURIComponent(target.url);
+ var url = new URL("http://{{host}}:{{ports[https][0]}}/common/redirect.py?location=" + encodeURIComponent(target.url));
url.protocol = protocol == Protocol.INSECURE ? "http" : "https";
url.hostname = host == Host.SAME_ORIGIN ? "{{host}}" : "{{domains[天気の良い日]}}";
return {
diff --git a/tests/wpt/web-platform-tests/web-animations/animation-model/animation-types/property-types.js b/tests/wpt/web-platform-tests/web-animations/animation-model/animation-types/property-types.js
index 9382c6297b9..64a7eb47627 100644
--- a/tests/wpt/web-platform-tests/web-animations/animation-model/animation-types/property-types.js
+++ b/tests/wpt/web-platform-tests/web-animations/animation-model/animation-types/property-types.js
@@ -1885,7 +1885,7 @@ const translateListType = {
1000
);
testAnimationSamples(animation, idlName,
- [{ time: 500, expected: '200px calc(25% - 50.5px) 200px' }]);
+ [{ time: 500, expected: 'calc(0% + 200px) calc(25% - 50.5px) 200px' }]);
}, `${property} with combination of percentages and lengths`);
},
testAddition: function(property, setup) {
diff --git a/tests/wpt/web-platform-tests/webrtc/RTCDtlsTransport-state.html b/tests/wpt/web-platform-tests/webrtc/RTCDtlsTransport-state.html
index 283ab087f70..fd7215fa4e1 100644
--- a/tests/wpt/web-platform-tests/webrtc/RTCDtlsTransport-state.html
+++ b/tests/wpt/web-platform-tests/webrtc/RTCDtlsTransport-state.html
@@ -42,16 +42,54 @@ function resolveWhen(t, dtlstransport, state) {
});
}
-promise_test(async t => {
+// Helper class to exchange ice candidates between
+// two local peer connections
+class CandidateChannel {
+ constructor(source, dest) {
+ source.addEventListener('icecandidate', event => {
+ const { candidate } = event;
+ if (candidate && this.activated
+ && this.destination.signalingState !== 'closed') {
+ this.destination.addIceCandidate(candidate);
+ } else {
+ this.queue.push(candidate);
+ }
+ });
+ this.destination = dest;
+ this.activated = false;
+ this.queue = [];
+ }
+ activate() {
+ this.activated = true;
+ for (const candidate of this.queue) {
+ this.destination.addIceCandidate(candidate);
+ }
+ }
+}
+
+function coupleCandidates(pc1, pc2) {
+ const ch1 = new CandidateChannel(pc1, pc2);
+ const ch2 = new CandidateChannel(pc2, pc1);
+ return [ch1, ch2];
+}
+
+async function setupConnections(t) {
const pc1 = new RTCPeerConnection();
t.add_cleanup(() => pc1.close());
const pc2 = new RTCPeerConnection();
t.add_cleanup(() => pc2.close());
pc1.addTrack(trackFactories.audio());
- exchangeIceCandidates(pc1, pc2);
-
+ const channels = coupleCandidates(pc1, pc2);
await doSignalingHandshake(pc1, pc2);
+ for (const channel of channels) {
+ channel.activate();
+ }
+ return [pc1, pc2];
+}
+
+promise_test(async t => {
+ const [pc1, pc2] = await setupConnections(t);
const dtlsTransport1 = pc1.getTransceivers()[0].sender.transport;
const dtlsTransport2 = pc2.getTransceivers()[0].sender.transport;
assert_true(dtlsTransport1 instanceof RTCDtlsTransport);
@@ -61,15 +99,8 @@ promise_test(async t => {
}, 'DTLS transport goes to connected state');
promise_test(async t => {
- const pc1 = new RTCPeerConnection();
- t.add_cleanup(() => pc1.close());
- const pc2 = new RTCPeerConnection();
- t.add_cleanup(() => pc2.close());
-
- pc1.addTrack(trackFactories.audio());
- exchangeIceCandidates(pc1, pc2);
+ const [pc1, pc2] = await setupConnections(t);
- await doSignalingHandshake(pc1, pc2);
const dtlsTransport1 = pc1.getTransceivers()[0].sender.transport;
const dtlsTransport2 = pc2.getTransceivers()[0].sender.transport;
await Promise.all([resolveWhen(t, dtlsTransport1, 'connected'),
@@ -79,15 +110,7 @@ promise_test(async t => {
}, 'close() causes the local transport to close immediately');
promise_test(async t => {
- const pc1 = new RTCPeerConnection();
- t.add_cleanup(() => pc1.close());
- const pc2 = new RTCPeerConnection();
- t.add_cleanup(() => pc2.close());
-
- pc1.addTrack(trackFactories.audio());
- exchangeIceCandidates(pc1, pc2);
-
- await doSignalingHandshake(pc1, pc2);
+ const [pc1, pc2] = await setupConnections(t);
const dtlsTransport1 = pc1.getTransceivers()[0].sender.transport;
const dtlsTransport2 = pc2.getTransceivers()[0].sender.transport;
await Promise.all([resolveWhen(t, dtlsTransport1, 'connected'),