diff options
author | bors-servo <lbergstrom+bors@mozilla.com> | 2019-01-10 00:22:00 -0500 |
---|---|---|
committer | GitHub <noreply@github.com> | 2019-01-10 00:22:00 -0500 |
commit | 61893dde1400d1e391faf5e52e7af5fb989a2dbb (patch) | |
tree | 17f0f9c4d4a8d86eaf61fa56039d9c8605167cf9 | |
parent | 192fbafd11126744a299558d14c4b2c63e3cd2ca (diff) | |
parent | 59ef536d5e8aed6aa4f4dd0105b4920c4a437bc5 (diff) | |
download | servo-61893dde1400d1e391faf5e52e7af5fb989a2dbb.tar.gz servo-61893dde1400d1e391faf5e52e7af5fb989a2dbb.zip |
Auto merge of #22665 - servo-wpt-sync:wpt_update_09-01-2019, r=jdm
Sync WPT with upstream (09-01-2019)
Automated downstream sync of changes from upstream as of 09-01-2019.
[no-wpt-sync]
<!-- Reviewable:start -->
---
This change is [<img src="https://reviewable.io/review_button.svg" height="34" align="absmiddle" alt="Reviewable"/>](https://reviewable.io/reviews/servo/servo/22665)
<!-- Reviewable:end -->
120 files changed, 1205 insertions, 3165 deletions
diff --git a/tests/wpt/metadata/2dcontext/drawing-images-to-the-canvas/drawimage_svg_image_with_foreign_object_does_not_taint.html.ini b/tests/wpt/metadata/2dcontext/drawing-images-to-the-canvas/drawimage_svg_image_with_foreign_object_does_not_taint.html.ini new file mode 100644 index 00000000000..0d351bdbe2e --- /dev/null +++ b/tests/wpt/metadata/2dcontext/drawing-images-to-the-canvas/drawimage_svg_image_with_foreign_object_does_not_taint.html.ini @@ -0,0 +1,5 @@ +[drawimage_svg_image_with_foreign_object_does_not_taint.html] + expected: TIMEOUT + [Canvas should not be tainted after drawing SVG including <foreignObject>] + expected: TIMEOUT + diff --git a/tests/wpt/metadata/MANIFEST.json b/tests/wpt/metadata/MANIFEST.json index 75607289d83..e5e42757c16 100644 --- a/tests/wpt/metadata/MANIFEST.json +++ b/tests/wpt/metadata/MANIFEST.json @@ -104479,48 +104479,48 @@ {} ] ], - "css/css-backgrounds/background-image-centered.html": [ + "css/css-backgrounds/background-image-centered-with-border-radius.html": [ [ - "/css/css-backgrounds/background-image-centered.html", + "/css/css-backgrounds/background-image-centered-with-border-radius.html", [ [ - "/css/css-backgrounds/background-image-centered-ref.html", + "/css/css-backgrounds/reference/background-image-centered-with-border-radius-ref.html", "==" ] ], {} ] ], - "css/css-backgrounds/background-image-cover-zoomed-1.html": [ + "css/css-backgrounds/background-image-centered.html": [ [ - "/css/css-backgrounds/background-image-cover-zoomed-1.html", + "/css/css-backgrounds/background-image-centered.html", [ [ - "/css/css-backgrounds/reference/background-image-cover-zoomed-1-ref.html", + "/css/css-backgrounds/background-image-centered-ref.html", "==" ] ], {} ] ], - "css/css-backgrounds/background-image-first-letter.html": [ + "css/css-backgrounds/background-image-cover-zoomed-1.html": [ [ - "/css/css-backgrounds/background-image-first-letter.html", + "/css/css-backgrounds/background-image-cover-zoomed-1.html", [ [ - "/css/css-backgrounds/reference/background-image-first-letter-ref.html", + "/css/css-backgrounds/reference/background-image-cover-zoomed-1-ref.html", "==" ] ], {} ] ], - "css/css-backgrounds/background-image-first-line.html": [ + "css/css-backgrounds/background-image-first-letter.html": [ [ - "/css/css-backgrounds/background-image-first-line.html", + "/css/css-backgrounds/background-image-first-letter.html", [ [ - "/css/css-backgrounds/reference/background-image-first-line-ref.html", + "/css/css-backgrounds/reference/background-image-first-letter-ref.html", "==" ] ], @@ -192123,6 +192123,18 @@ {} ] ], + "html/semantics/embedded-content/the-img-element/sizes/sizes-dynamic-002.html": [ + [ + "/html/semantics/embedded-content/the-img-element/sizes/sizes-dynamic-002.html", + [ + [ + "/html/semantics/embedded-content/the-img-element/sizes/sizes-dynamic-001-ref.html", + "==" + ] + ], + {} + ] + ], "html/semantics/embedded-content/the-video-element/video_content_image.htm": [ [ "/html/semantics/embedded-content/the-video-element/video_content_image.htm", @@ -253238,17 +253250,17 @@ {} ] ], - "css/css-backgrounds/reference/background-image-cover-zoomed-1-ref.html": [ + "css/css-backgrounds/reference/background-image-centered-with-border-radius-ref.html": [ [ {} ] ], - "css/css-backgrounds/reference/background-image-first-letter-ref.html": [ + "css/css-backgrounds/reference/background-image-cover-zoomed-1-ref.html": [ [ {} ] ], - "css/css-backgrounds/reference/background-image-first-line-ref.html": [ + "css/css-backgrounds/reference/background-image-first-letter-ref.html": [ [ {} ] @@ -253673,6 +253685,11 @@ {} ] ], + "css/css-backgrounds/support/green-60x60-red-5px-border.png": [ + [ + {} + ] + ], "css/css-backgrounds/support/green.png": [ [ {} @@ -305188,191 +305205,86 @@ {} ] ], - "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/a-tag/no-redirect/same-origin-downgrade.http.html.headers": [ - [ - {} - ] - ], "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/a-tag/no-redirect/same-origin-upgrade.http.html.headers": [ [ {} ] ], - "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/same-origin-downgrade.http.html.headers": [ - [ - {} - ] - ], "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/same-origin-upgrade.http.html.headers": [ [ {} ] ], - "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/no-redirect/same-origin-downgrade.http.html.headers": [ - [ - {} - ] - ], "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/no-redirect/same-origin-upgrade.http.html.headers": [ [ {} ] ], - "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-downgrade.http.html.headers": [ - [ - {} - ] - ], "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-insecure.http.html.headers": [ [ {} ] ], - "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-upgrade.http.html.headers": [ - [ - {} - ] - ], - "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/same-origin-downgrade.http.html.headers": [ - [ - {} - ] - ], "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/same-origin-upgrade.http.html.headers": [ [ {} ] ], - "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/no-redirect/same-origin-downgrade.http.html.headers": [ - [ - {} - ] - ], "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/no-redirect/same-origin-upgrade.http.html.headers": [ [ {} ] ], - "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-downgrade.http.html.headers": [ - [ - {} - ] - ], "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-insecure.http.html.headers": [ [ {} ] ], - "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-upgrade.http.html.headers": [ - [ - {} - ] - ], - "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/same-origin-downgrade.http.html.headers": [ - [ - {} - ] - ], "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/same-origin-upgrade.http.html.headers": [ [ {} ] ], - "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/no-redirect/same-origin-downgrade.http.html.headers": [ - [ - {} - ] - ], "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/no-redirect/same-origin-upgrade.http.html.headers": [ [ {} ] ], - "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-downgrade.http.html.headers": [ - [ - {} - ] - ], "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-insecure.http.html.headers": [ [ {} ] ], - "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-upgrade.http.html.headers": [ - [ - {} - ] - ], - "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/same-origin-downgrade.http.html.headers": [ - [ - {} - ] - ], "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/same-origin-upgrade.http.html.headers": [ [ {} ] ], - "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/no-redirect/same-origin-downgrade.http.html.headers": [ - [ - {} - ] - ], "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/no-redirect/same-origin-upgrade.http.html.headers": [ [ {} ] ], - "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-downgrade.http.html.headers": [ - [ - {} - ] - ], "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-insecure.http.html.headers": [ [ {} ] ], - "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-upgrade.http.html.headers": [ - [ - {} - ] - ], - "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/same-origin-downgrade.http.html.headers": [ - [ - {} - ] - ], "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/same-origin-upgrade.http.html.headers": [ [ {} ] ], - "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/no-redirect/same-origin-downgrade.http.html.headers": [ - [ - {} - ] - ], "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/no-redirect/same-origin-upgrade.http.html.headers": [ [ {} ] ], - "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-downgrade.http.html.headers": [ - [ - {} - ] - ], "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-insecure.http.html.headers": [ [ {} ] ], - "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-upgrade.http.html.headers": [ - [ - {} - ] - ], "referrer-policy/origin/http-rp/cross-origin/http-http/a-tag/no-redirect/generic.http.html.headers": [ [ {} @@ -312003,6 +311915,21 @@ {} ] ], + "signed-exchange/resources/check-cert-request.py": [ + [ + {} + ] + ], + "signed-exchange/resources/check-cert-request.sxg": [ + [ + {} + ] + ], + "signed-exchange/resources/check-cert-request.sxg.headers": [ + [ + {} + ] + ], "signed-exchange/resources/failure.html": [ [ {} @@ -312098,6 +312025,16 @@ {} ] ], + "signed-exchange/resources/sxg-noncacheable.sxg": [ + [ + {} + ] + ], + "signed-exchange/resources/sxg-noncacheable.sxg.headers": [ + [ + {} + ] + ], "signed-exchange/resources/sxg-utf8-inner-url.sxg": [ [ {} @@ -327051,6 +326988,12 @@ {} ] ], + "2dcontext/drawing-images-to-the-canvas/drawimage_svg_image_with_foreign_object_does_not_taint.html": [ + [ + "/2dcontext/drawing-images-to-the-canvas/drawimage_svg_image_with_foreign_object_does_not_taint.html", + {} + ] + ], "2dcontext/drawing-paths-to-the-canvas/canvas_complexshapes_ispointInpath_001.htm": [ [ "/2dcontext/drawing-paths-to-the-canvas/canvas_complexshapes_ispointInpath_001.htm", @@ -340101,6 +340044,12 @@ {} ] ], + "css/compositing/inheritance.html": [ + [ + "/css/compositing/inheritance.html", + {} + ] + ], "css/compositing/mix-blend-mode/mix-blend-mode-creates-stacking-context.html": [ [ "/css/compositing/mix-blend-mode/mix-blend-mode-creates-stacking-context.html", @@ -356781,6 +356730,16 @@ {} ] ], + "encoding/encodeInto.any.js": [ + [ + "/encoding/encodeInto.any.html", + {} + ], + [ + "/encoding/encodeInto.any.worker.html", + {} + ] + ], "encoding/gb18030-encoder.html": [ [ "/encoding/gb18030-encoder.html", @@ -383073,6 +383032,12 @@ {} ] ], + "mediacapture-record/MediaRecorder-disabled-tracks.https.html": [ + [ + "/mediacapture-record/MediaRecorder-disabled-tracks.https.html", + {} + ] + ], "mediacapture-record/MediaRecorder-error.html": [ [ "/mediacapture-record/MediaRecorder-error.html", @@ -399881,144 +399846,66 @@ {} ] ], - "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/a-tag/no-redirect/same-origin-downgrade.http.html": [ - [ - "/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/a-tag/no-redirect/same-origin-downgrade.http.html", - {} - ] - ], "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/a-tag/no-redirect/same-origin-upgrade.http.html": [ [ "/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/a-tag/no-redirect/same-origin-upgrade.http.html", {} ] ], - "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/same-origin-downgrade.http.html": [ - [ - "/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/same-origin-downgrade.http.html", - {} - ] - ], "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/same-origin-upgrade.http.html": [ [ "/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/same-origin-upgrade.http.html", {} ] ], - "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/no-redirect/same-origin-downgrade.http.html": [ - [ - "/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/no-redirect/same-origin-downgrade.http.html", - {} - ] - ], "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/no-redirect/same-origin-upgrade.http.html": [ [ "/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/no-redirect/same-origin-upgrade.http.html", {} ] ], - "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-downgrade.http.html": [ - [ - "/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-downgrade.http.html", - {} - ] - ], "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-insecure.http.html": [ [ "/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-insecure.http.html", {} ] ], - "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-upgrade.http.html": [ - [ - "/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-upgrade.http.html", - {} - ] - ], - "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/keep-origin-redirect/same-origin-downgrade.http.html": [ - [ - "/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/keep-origin-redirect/same-origin-downgrade.http.html", - {} - ] - ], "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/keep-origin-redirect/same-origin-upgrade.http.html": [ [ "/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/keep-origin-redirect/same-origin-upgrade.http.html", {} ] ], - "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/no-redirect/same-origin-downgrade.http.html": [ - [ - "/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/no-redirect/same-origin-downgrade.http.html", - {} - ] - ], "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/no-redirect/same-origin-upgrade.http.html": [ [ "/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/no-redirect/same-origin-upgrade.http.html", {} ] ], - "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-downgrade.http.html": [ - [ - "/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-downgrade.http.html", - {} - ] - ], "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-insecure.http.html": [ [ "/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-insecure.http.html", {} ] ], - "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-upgrade.http.html": [ - [ - "/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-upgrade.http.html", - {} - ] - ], - "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/script-tag/keep-origin-redirect/same-origin-downgrade.http.html": [ - [ - "/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/script-tag/keep-origin-redirect/same-origin-downgrade.http.html", - {} - ] - ], "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/script-tag/keep-origin-redirect/same-origin-upgrade.http.html": [ [ "/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/script-tag/keep-origin-redirect/same-origin-upgrade.http.html", {} ] ], - "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/script-tag/no-redirect/same-origin-downgrade.http.html": [ - [ - "/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/script-tag/no-redirect/same-origin-downgrade.http.html", - {} - ] - ], "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/script-tag/no-redirect/same-origin-upgrade.http.html": [ [ "/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/script-tag/no-redirect/same-origin-upgrade.http.html", {} ] ], - "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-downgrade.http.html": [ - [ - "/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-downgrade.http.html", - {} - ] - ], "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-insecure.http.html": [ [ "/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-insecure.http.html", {} ] ], - "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-upgrade.http.html": [ - [ - "/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-upgrade.http.html", - {} - ] - ], "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/a-tag/no-redirect/cross-origin.http.html": [ [ "/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/a-tag/no-redirect/cross-origin.http.html", @@ -400343,228 +400230,102 @@ {} ] ], - "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/a-tag/no-redirect/same-origin-downgrade.http.html": [ - [ - "/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/a-tag/no-redirect/same-origin-downgrade.http.html", - {} - ] - ], "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/a-tag/no-redirect/same-origin-upgrade.http.html": [ [ "/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/a-tag/no-redirect/same-origin-upgrade.http.html", {} ] ], - "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/same-origin-downgrade.http.html": [ - [ - "/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/same-origin-downgrade.http.html", - {} - ] - ], "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/same-origin-upgrade.http.html": [ [ "/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/same-origin-upgrade.http.html", {} ] ], - "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/no-redirect/same-origin-downgrade.http.html": [ - [ - "/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/no-redirect/same-origin-downgrade.http.html", - {} - ] - ], "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/no-redirect/same-origin-upgrade.http.html": [ [ "/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/no-redirect/same-origin-upgrade.http.html", {} ] ], - "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-downgrade.http.html": [ - [ - "/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-downgrade.http.html", - {} - ] - ], "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-insecure.http.html": [ [ "/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-insecure.http.html", {} ] ], - "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-upgrade.http.html": [ - [ - "/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-upgrade.http.html", - {} - ] - ], - "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/same-origin-downgrade.http.html": [ - [ - "/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/same-origin-downgrade.http.html", - {} - ] - ], "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/same-origin-upgrade.http.html": [ [ "/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/same-origin-upgrade.http.html", {} ] ], - "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/no-redirect/same-origin-downgrade.http.html": [ - [ - "/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/no-redirect/same-origin-downgrade.http.html", - {} - ] - ], "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/no-redirect/same-origin-upgrade.http.html": [ [ "/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/no-redirect/same-origin-upgrade.http.html", {} ] ], - "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-downgrade.http.html": [ - [ - "/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-downgrade.http.html", - {} - ] - ], "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-insecure.http.html": [ [ "/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-insecure.http.html", {} ] ], - "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-upgrade.http.html": [ - [ - "/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-upgrade.http.html", - {} - ] - ], - "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/same-origin-downgrade.http.html": [ - [ - "/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/same-origin-downgrade.http.html", - {} - ] - ], "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/same-origin-upgrade.http.html": [ [ "/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/same-origin-upgrade.http.html", {} ] ], - "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/no-redirect/same-origin-downgrade.http.html": [ - [ - "/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/no-redirect/same-origin-downgrade.http.html", - {} - ] - ], "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/no-redirect/same-origin-upgrade.http.html": [ [ "/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/no-redirect/same-origin-upgrade.http.html", {} ] ], - "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-downgrade.http.html": [ - [ - "/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-downgrade.http.html", - {} - ] - ], "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-insecure.http.html": [ [ "/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-insecure.http.html", {} ] ], - "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-upgrade.http.html": [ - [ - "/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-upgrade.http.html", - {} - ] - ], - "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/same-origin-downgrade.http.html": [ - [ - "/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/same-origin-downgrade.http.html", - {} - ] - ], "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/same-origin-upgrade.http.html": [ [ "/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/same-origin-upgrade.http.html", {} ] ], - "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/no-redirect/same-origin-downgrade.http.html": [ - [ - "/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/no-redirect/same-origin-downgrade.http.html", - {} - ] - ], "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/no-redirect/same-origin-upgrade.http.html": [ [ "/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/no-redirect/same-origin-upgrade.http.html", {} ] ], - "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-downgrade.http.html": [ - [ - "/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-downgrade.http.html", - {} - ] - ], "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-insecure.http.html": [ [ "/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-insecure.http.html", {} ] ], - "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-upgrade.http.html": [ - [ - "/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-upgrade.http.html", - {} - ] - ], - "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/same-origin-downgrade.http.html": [ - [ - "/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/same-origin-downgrade.http.html", - {} - ] - ], "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/same-origin-upgrade.http.html": [ [ "/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/same-origin-upgrade.http.html", {} ] ], - "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/no-redirect/same-origin-downgrade.http.html": [ - [ - "/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/no-redirect/same-origin-downgrade.http.html", - {} - ] - ], "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/no-redirect/same-origin-upgrade.http.html": [ [ "/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/no-redirect/same-origin-upgrade.http.html", {} ] ], - "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-downgrade.http.html": [ - [ - "/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-downgrade.http.html", - {} - ] - ], "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-insecure.http.html": [ [ "/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-insecure.http.html", {} ] ], - "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-upgrade.http.html": [ - [ - "/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-upgrade.http.html", - {} - ] - ], "referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/a-tag/no-redirect/cross-origin.http.html": [ [ "/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/a-tag/no-redirect/cross-origin.http.html", @@ -400889,228 +400650,102 @@ {} ] ], - "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/a-tag/no-redirect/same-origin-downgrade.http.html": [ - [ - "/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/a-tag/no-redirect/same-origin-downgrade.http.html", - {} - ] - ], "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/a-tag/no-redirect/same-origin-upgrade.http.html": [ [ "/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/a-tag/no-redirect/same-origin-upgrade.http.html", {} ] ], - "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/keep-origin-redirect/same-origin-downgrade.http.html": [ - [ - "/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/keep-origin-redirect/same-origin-downgrade.http.html", - {} - ] - ], "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/keep-origin-redirect/same-origin-upgrade.http.html": [ [ "/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/keep-origin-redirect/same-origin-upgrade.http.html", {} ] ], - "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/no-redirect/same-origin-downgrade.http.html": [ - [ - "/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/no-redirect/same-origin-downgrade.http.html", - {} - ] - ], "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/no-redirect/same-origin-upgrade.http.html": [ [ "/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/no-redirect/same-origin-upgrade.http.html", {} ] ], - "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-downgrade.http.html": [ - [ - "/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-downgrade.http.html", - {} - ] - ], "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-insecure.http.html": [ [ "/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-insecure.http.html", {} ] ], - "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-upgrade.http.html": [ - [ - "/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-upgrade.http.html", - {} - ] - ], - "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/same-origin-downgrade.http.html": [ - [ - "/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/same-origin-downgrade.http.html", - {} - ] - ], "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/same-origin-upgrade.http.html": [ [ "/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/same-origin-upgrade.http.html", {} ] ], - "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/no-redirect/same-origin-downgrade.http.html": [ - [ - "/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/no-redirect/same-origin-downgrade.http.html", - {} - ] - ], "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/no-redirect/same-origin-upgrade.http.html": [ [ "/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/no-redirect/same-origin-upgrade.http.html", {} ] ], - "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-downgrade.http.html": [ - [ - "/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-downgrade.http.html", - {} - ] - ], "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-insecure.http.html": [ [ "/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-insecure.http.html", {} ] ], - "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-upgrade.http.html": [ - [ - "/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-upgrade.http.html", - {} - ] - ], - "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/keep-origin-redirect/same-origin-downgrade.http.html": [ - [ - "/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/keep-origin-redirect/same-origin-downgrade.http.html", - {} - ] - ], "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/keep-origin-redirect/same-origin-upgrade.http.html": [ [ "/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/keep-origin-redirect/same-origin-upgrade.http.html", {} ] ], - "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/no-redirect/same-origin-downgrade.http.html": [ - [ - "/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/no-redirect/same-origin-downgrade.http.html", - {} - ] - ], "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/no-redirect/same-origin-upgrade.http.html": [ [ "/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/no-redirect/same-origin-upgrade.http.html", {} ] ], - "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-downgrade.http.html": [ - [ - "/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-downgrade.http.html", - {} - ] - ], "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-insecure.http.html": [ [ "/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-insecure.http.html", {} ] ], - "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-upgrade.http.html": [ - [ - "/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-upgrade.http.html", - {} - ] - ], - "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/keep-origin-redirect/same-origin-downgrade.http.html": [ - [ - "/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/keep-origin-redirect/same-origin-downgrade.http.html", - {} - ] - ], "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/keep-origin-redirect/same-origin-upgrade.http.html": [ [ "/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/keep-origin-redirect/same-origin-upgrade.http.html", {} ] ], - "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/no-redirect/same-origin-downgrade.http.html": [ - [ - "/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/no-redirect/same-origin-downgrade.http.html", - {} - ] - ], "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/no-redirect/same-origin-upgrade.http.html": [ [ "/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/no-redirect/same-origin-upgrade.http.html", {} ] ], - "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-downgrade.http.html": [ - [ - "/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-downgrade.http.html", - {} - ] - ], "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-insecure.http.html": [ [ "/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-insecure.http.html", {} ] ], - "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-upgrade.http.html": [ - [ - "/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-upgrade.http.html", - {} - ] - ], - "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/keep-origin-redirect/same-origin-downgrade.http.html": [ - [ - "/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/keep-origin-redirect/same-origin-downgrade.http.html", - {} - ] - ], "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/keep-origin-redirect/same-origin-upgrade.http.html": [ [ "/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/keep-origin-redirect/same-origin-upgrade.http.html", {} ] ], - "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/no-redirect/same-origin-downgrade.http.html": [ - [ - "/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/no-redirect/same-origin-downgrade.http.html", - {} - ] - ], "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/no-redirect/same-origin-upgrade.http.html": [ [ "/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/no-redirect/same-origin-upgrade.http.html", {} ] ], - "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-downgrade.http.html": [ - [ - "/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-downgrade.http.html", - {} - ] - ], "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-insecure.http.html": [ [ "/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-insecure.http.html", {} ] ], - "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-upgrade.http.html": [ - [ - "/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-upgrade.http.html", - {} - ] - ], "referrer-policy/origin/attr-referrer/cross-origin/http-http/a-tag/no-redirect/generic.http.html": [ [ "/referrer-policy/origin/attr-referrer/cross-origin/http-http/a-tag/no-redirect/generic.http.html", @@ -410057,6 +409692,12 @@ {} ] ], + "shadow-dom/offsetParent-across-shadow-boundaries.html": [ + [ + "/shadow-dom/offsetParent-across-shadow-boundaries.html", + {} + ] + ], "shadow-dom/scroll-to-the-fragment-in-shadow-tree.html": [ [ "/shadow-dom/scroll-to-the-fragment-in-shadow-tree.html", @@ -410439,6 +410080,12 @@ {} ] ], + "signed-exchange/check-cert-request.tentative.html": [ + [ + "/signed-exchange/check-cert-request.tentative.html", + {} + ] + ], "signed-exchange/fallback-to-another-sxg.tentative.html": [ [ "/signed-exchange/fallback-to-another-sxg.tentative.html", @@ -410505,6 +410152,12 @@ {} ] ], + "signed-exchange/sxg-noncacheable.tentative.html": [ + [ + "/signed-exchange/sxg-noncacheable.tentative.html", + {} + ] + ], "signed-exchange/sxg-prefetch-resource-timing.tentative.html": [ [ "/signed-exchange/sxg-prefetch-resource-timing.tentative.html", @@ -445417,7 +445070,7 @@ }, "paths": { ".azure-pipelines.yml": [ - "9ddcd25654bdc67bbafd6c11f10a39dc030bdbfb", + "773ff6cc5f9f42a0585b6db38a53d0bb1cc6297e", "support" ], ".codecov.yml": [ @@ -446336,6 +445989,10 @@ "6208b8dc05629208ee3d68b233e1b6c107d1d12b", "testharness" ], + "2dcontext/drawing-images-to-the-canvas/drawimage_svg_image_with_foreign_object_does_not_taint.html": [ + "f29b2bf5a8a7eb45c22306faaf5028428e28cf9b", + "testharness" + ], "2dcontext/drawing-paths-to-the-canvas/canvas_complexshapes_ispointInpath_001.htm": [ "18c3c9afb9506d4fa9214b091cd4aeb74ce26f9b", "testharness" @@ -455653,7 +455310,7 @@ "support" ], "bluetooth/META.yml": [ - "c93f16a3a5f41ff248b0c7cb4fa23e1844af21da", + "501396bac744058ef594b19a935732ba0f277219", "support" ], "bluetooth/README.md": [ @@ -539104,6 +538761,10 @@ "44f138b5a6e1bb0d92206a5e0777de98f641fec0", "reftest" ], + "css/compositing/inheritance.html": [ + "8bd08672edf54d3e6478841af7714235afb7bfab", + "testharness" + ], "css/compositing/isolation/blend-isolation.html": [ "d1aa412ecf1b970a271f8ed0919c378ab9ec5fdb", "visual" @@ -540724,6 +540385,10 @@ "f52cd963ad25238bafc2081b7024aa5375614f5a", "support" ], + "css/css-backgrounds/background-image-centered-with-border-radius.html": [ + "602cd48aaa9bdb9d5c126577638b00ab81e8f93d", + "reftest" + ], "css/css-backgrounds/background-image-centered.html": [ "7051aa359c8cdf427a6c1b63179baad26c5a1645", "reftest" @@ -540736,10 +540401,6 @@ "f78460b90708223616a019aa48aaaa4fe8b2ce43", "reftest" ], - "css/css-backgrounds/background-image-first-line.html": [ - "c8dee7050b6241279d5f462263b9fdead50004fc", - "reftest" - ], "css/css-backgrounds/background-image-none-gradient-repaint.html": [ "3f39fb8d850d7561703f791135ea7dd4b3aa9fe8", "reftest" @@ -543312,6 +542973,10 @@ "f8b2ad25ccdc743e638d402590141296c142e602", "support" ], + "css/css-backgrounds/reference/background-image-centered-with-border-radius-ref.html": [ + "44db3f56017f3408dc750ac48b07c644d0f05db2", + "support" + ], "css/css-backgrounds/reference/background-image-cover-zoomed-1-ref.html": [ "d61bac9feddf1013aa2db92cba8d258a523de446", "support" @@ -543320,10 +542985,6 @@ "304be71fbace6a964566e2a24dc8ab802cdec7e3", "support" ], - "css/css-backgrounds/reference/background-image-first-line-ref.html": [ - "82fd9a2d3d0e3c886835168283ec3f32270c0356", - "support" - ], "css/css-backgrounds/reference/background-origin-002-ref.html": [ "88d61225a623d112e5f54505899a21dd4d929a5b", "support" @@ -543664,6 +543325,10 @@ "b061c1f33f7d3a5d4e917c42d7efe23ec10eb6e0", "support" ], + "css/css-backgrounds/support/green-60x60-red-5px-border.png": [ + "97a94592dd597b75d164592f54d5db2d2023011c", + "support" + ], "css/css-backgrounds/support/green.png": [ "5c5217b1e7b27ef88f06cf3ced87f5e115eadbe6", "support" @@ -611224,6 +610889,10 @@ "7260b6b155b13de3961d170c3e2868042e229305", "testharness" ], + "encoding/encodeInto.any.js": [ + "2abc69744d7018a80f61022c6aa9a8225d050b6c", + "testharness" + ], "encoding/eof-shift_jis-ref.html": [ "b90f8032a31db260902c2c04b671b30ee9c62c8e", "support" @@ -614345,7 +614014,7 @@ "testharness" ], "fetch/api/abort/general.any.js": [ - "11999cc92700aebd8a94c6d279d8e21c474ee2b2", + "d6159c7e1b0261796bf553b39b3c6a0cc5a1842b", "testharness" ], "fetch/api/abort/keepalive.html": [ @@ -629764,6 +629433,10 @@ "51f8145bf97958af3950b0f33061488274c03d60", "reftest" ], + "html/semantics/embedded-content/the-img-element/sizes/sizes-dynamic-002.html": [ + "6c64b3da39200c51902ecdf7352d62df2704e576", + "reftest" + ], "html/semantics/embedded-content/the-img-element/sizes/support/parse-a-sizes-attribute.js": [ "62ad00a4682b269e52797f6e2ee8e46bf44d56ac", "support" @@ -637001,7 +636674,7 @@ "support" ], "interfaces/webxr.idl": [ - "ea45aef97715ec7d4e098e357af69575eb432ebd", + "3054500f5903f72214b4bd8984488a186b2a5d8a", "support" ], "interfaces/worklets.idl": [ @@ -638688,6 +638361,10 @@ "1710d238b6e31d285766f25f4625d206d1d8a1fc", "testharness" ], + "mediacapture-record/MediaRecorder-disabled-tracks.https.html": [ + "fe26e0c9616a58c2c884e66eaf721e67709f09d5", + "testharness" + ], "mediacapture-record/MediaRecorder-error.html": [ "2459449acf931cd38301fca11e7b15326afac040", "testharness" @@ -650781,7 +650458,7 @@ "support" ], "referrer-policy/generic/tools/generate.py": [ - "30e5b6142f94b74fd961cfc376e7aa1cc0d39f00", + "84aa9feab424d062a05f9a00b914760a1f788dbf", "support" ], "referrer-policy/generic/tools/regenerate": [ @@ -652916,98 +652593,46 @@ "46c715d6aa2fab2b6345ece4d0ce38d65249e2ec", "testharness" ], - "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/a-tag/no-redirect/same-origin-downgrade.http.html": [ - "12903c4da403b797c832766934299f2b30a88740", - "testharness" - ], "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/a-tag/no-redirect/same-origin-upgrade.http.html": [ "12903c4da403b797c832766934299f2b30a88740", "testharness" ], - "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/same-origin-downgrade.http.html": [ - "ca0b0b1b5f564ae84b27ec1936877748dbdde05e", - "testharness" - ], "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/same-origin-upgrade.http.html": [ "ca0b0b1b5f564ae84b27ec1936877748dbdde05e", "testharness" ], - "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/no-redirect/same-origin-downgrade.http.html": [ - "19cf59322f7b43bce60f590bbad7f676316118fd", - "testharness" - ], "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/no-redirect/same-origin-upgrade.http.html": [ "19cf59322f7b43bce60f590bbad7f676316118fd", "testharness" ], - "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-downgrade.http.html": [ - "77452623c86210bec379fff66b51d97eed4a4c6d", - "testharness" - ], "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-insecure.http.html": [ "77452623c86210bec379fff66b51d97eed4a4c6d", "testharness" ], - "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-upgrade.http.html": [ - "77452623c86210bec379fff66b51d97eed4a4c6d", - "testharness" - ], - "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/keep-origin-redirect/same-origin-downgrade.http.html": [ - "f0c9e6fd969c134b09205085ba9e6d6c60a8af01", - "testharness" - ], "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/keep-origin-redirect/same-origin-upgrade.http.html": [ "f0c9e6fd969c134b09205085ba9e6d6c60a8af01", "testharness" ], - "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/no-redirect/same-origin-downgrade.http.html": [ - "2aed178fd08aa081f22be120bd1db62e04d05476", - "testharness" - ], "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/no-redirect/same-origin-upgrade.http.html": [ "2aed178fd08aa081f22be120bd1db62e04d05476", "testharness" ], - "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-downgrade.http.html": [ - "4e184519eb8b6f4cda6380dd8a4be8edd5311ac3", - "testharness" - ], "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-insecure.http.html": [ "4e184519eb8b6f4cda6380dd8a4be8edd5311ac3", "testharness" ], - "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-upgrade.http.html": [ - "4e184519eb8b6f4cda6380dd8a4be8edd5311ac3", - "testharness" - ], - "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/script-tag/keep-origin-redirect/same-origin-downgrade.http.html": [ - "9063bbd5ee5091664415dd6b9024c2d2397f4f8a", - "testharness" - ], "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/script-tag/keep-origin-redirect/same-origin-upgrade.http.html": [ "9063bbd5ee5091664415dd6b9024c2d2397f4f8a", "testharness" ], - "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/script-tag/no-redirect/same-origin-downgrade.http.html": [ - "56bc742d64d4661438e07d31cd7884b72c711c65", - "testharness" - ], "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/script-tag/no-redirect/same-origin-upgrade.http.html": [ "56bc742d64d4661438e07d31cd7884b72c711c65", "testharness" ], - "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-downgrade.http.html": [ - "3209c5beebf69df7088635450351131464d34e94", - "testharness" - ], "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-insecure.http.html": [ "3209c5beebf69df7088635450351131464d34e94", "testharness" ], - "referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-upgrade.http.html": [ - "3209c5beebf69df7088635450351131464d34e94", - "testharness" - ], "referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/a-tag/no-redirect/cross-origin.http.html": [ "d78b7146cceff8e134e44238addb4c03d88eef85", "testharness" @@ -653440,14 +653065,6 @@ "9ce1de38843b358434a917f1c992c99d0c7fd9fb", "support" ], - "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/a-tag/no-redirect/same-origin-downgrade.http.html": [ - "79e75063576a06b42944d30e579f12dd07010fb9", - "testharness" - ], - "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/a-tag/no-redirect/same-origin-downgrade.http.html.headers": [ - "9ce1de38843b358434a917f1c992c99d0c7fd9fb", - "support" - ], "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/a-tag/no-redirect/same-origin-upgrade.http.html": [ "79e75063576a06b42944d30e579f12dd07010fb9", "testharness" @@ -653456,14 +653073,6 @@ "9ce1de38843b358434a917f1c992c99d0c7fd9fb", "support" ], - "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/same-origin-downgrade.http.html": [ - "ee78d6ef1e935467a6a084f439274dec79567e7b", - "testharness" - ], - "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/same-origin-downgrade.http.html.headers": [ - "9ce1de38843b358434a917f1c992c99d0c7fd9fb", - "support" - ], "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/same-origin-upgrade.http.html": [ "ee78d6ef1e935467a6a084f439274dec79567e7b", "testharness" @@ -653472,14 +653081,6 @@ "9ce1de38843b358434a917f1c992c99d0c7fd9fb", "support" ], - "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/no-redirect/same-origin-downgrade.http.html": [ - "0019b7d1f3364015539c584377d75fc961105041", - "testharness" - ], - "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/no-redirect/same-origin-downgrade.http.html.headers": [ - "9ce1de38843b358434a917f1c992c99d0c7fd9fb", - "support" - ], "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/no-redirect/same-origin-upgrade.http.html": [ "0019b7d1f3364015539c584377d75fc961105041", "testharness" @@ -653488,14 +653089,6 @@ "9ce1de38843b358434a917f1c992c99d0c7fd9fb", "support" ], - "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-downgrade.http.html": [ - "f4020bdff8a58c739526b9601a51d3a6adc971e6", - "testharness" - ], - "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-downgrade.http.html.headers": [ - "9ce1de38843b358434a917f1c992c99d0c7fd9fb", - "support" - ], "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-insecure.http.html": [ "f4020bdff8a58c739526b9601a51d3a6adc971e6", "testharness" @@ -653504,22 +653097,6 @@ "9ce1de38843b358434a917f1c992c99d0c7fd9fb", "support" ], - "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-upgrade.http.html": [ - "f4020bdff8a58c739526b9601a51d3a6adc971e6", - "testharness" - ], - "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-upgrade.http.html.headers": [ - "9ce1de38843b358434a917f1c992c99d0c7fd9fb", - "support" - ], - "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/same-origin-downgrade.http.html": [ - "48dcc5d522e87086f229d39b73210e29e9d268b8", - "testharness" - ], - "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/same-origin-downgrade.http.html.headers": [ - "9ce1de38843b358434a917f1c992c99d0c7fd9fb", - "support" - ], "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/same-origin-upgrade.http.html": [ "48dcc5d522e87086f229d39b73210e29e9d268b8", "testharness" @@ -653528,14 +653105,6 @@ "9ce1de38843b358434a917f1c992c99d0c7fd9fb", "support" ], - "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/no-redirect/same-origin-downgrade.http.html": [ - "6cc4669d98825c22ab1ae4ebc2f83611c3bf8b87", - "testharness" - ], - "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/no-redirect/same-origin-downgrade.http.html.headers": [ - "9ce1de38843b358434a917f1c992c99d0c7fd9fb", - "support" - ], "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/no-redirect/same-origin-upgrade.http.html": [ "6cc4669d98825c22ab1ae4ebc2f83611c3bf8b87", "testharness" @@ -653544,14 +653113,6 @@ "9ce1de38843b358434a917f1c992c99d0c7fd9fb", "support" ], - "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-downgrade.http.html": [ - "b1bacfe9bbad91ab236d2d0d5bce7e6003c49cbd", - "testharness" - ], - "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-downgrade.http.html.headers": [ - "9ce1de38843b358434a917f1c992c99d0c7fd9fb", - "support" - ], "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-insecure.http.html": [ "b1bacfe9bbad91ab236d2d0d5bce7e6003c49cbd", "testharness" @@ -653560,22 +653121,6 @@ "9ce1de38843b358434a917f1c992c99d0c7fd9fb", "support" ], - "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-upgrade.http.html": [ - "b1bacfe9bbad91ab236d2d0d5bce7e6003c49cbd", - "testharness" - ], - "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-upgrade.http.html.headers": [ - "9ce1de38843b358434a917f1c992c99d0c7fd9fb", - "support" - ], - "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/same-origin-downgrade.http.html": [ - "08156b668c4cd77941068946bef80083e2c69fca", - "testharness" - ], - "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/same-origin-downgrade.http.html.headers": [ - "9ce1de38843b358434a917f1c992c99d0c7fd9fb", - "support" - ], "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/same-origin-upgrade.http.html": [ "08156b668c4cd77941068946bef80083e2c69fca", "testharness" @@ -653584,14 +653129,6 @@ "9ce1de38843b358434a917f1c992c99d0c7fd9fb", "support" ], - "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/no-redirect/same-origin-downgrade.http.html": [ - "ae1f44978c7b6d933da161515fc8edaa0824771a", - "testharness" - ], - "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/no-redirect/same-origin-downgrade.http.html.headers": [ - "9ce1de38843b358434a917f1c992c99d0c7fd9fb", - "support" - ], "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/no-redirect/same-origin-upgrade.http.html": [ "ae1f44978c7b6d933da161515fc8edaa0824771a", "testharness" @@ -653600,14 +653137,6 @@ "9ce1de38843b358434a917f1c992c99d0c7fd9fb", "support" ], - "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-downgrade.http.html": [ - "7b0f9d4b3b7d64c16be5bc4734896782e845237f", - "testharness" - ], - "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-downgrade.http.html.headers": [ - "9ce1de38843b358434a917f1c992c99d0c7fd9fb", - "support" - ], "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-insecure.http.html": [ "7b0f9d4b3b7d64c16be5bc4734896782e845237f", "testharness" @@ -653616,22 +653145,6 @@ "9ce1de38843b358434a917f1c992c99d0c7fd9fb", "support" ], - "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-upgrade.http.html": [ - "7b0f9d4b3b7d64c16be5bc4734896782e845237f", - "testharness" - ], - "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-upgrade.http.html.headers": [ - "9ce1de38843b358434a917f1c992c99d0c7fd9fb", - "support" - ], - "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/same-origin-downgrade.http.html": [ - "633eb15d97a9594632f782a0fa7722bf34bf6cba", - "testharness" - ], - "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/same-origin-downgrade.http.html.headers": [ - "9ce1de38843b358434a917f1c992c99d0c7fd9fb", - "support" - ], "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/same-origin-upgrade.http.html": [ "633eb15d97a9594632f782a0fa7722bf34bf6cba", "testharness" @@ -653640,14 +653153,6 @@ "9ce1de38843b358434a917f1c992c99d0c7fd9fb", "support" ], - "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/no-redirect/same-origin-downgrade.http.html": [ - "b7dd2d260b232c707390d2b47dfb16813615df2e", - "testharness" - ], - "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/no-redirect/same-origin-downgrade.http.html.headers": [ - "9ce1de38843b358434a917f1c992c99d0c7fd9fb", - "support" - ], "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/no-redirect/same-origin-upgrade.http.html": [ "b7dd2d260b232c707390d2b47dfb16813615df2e", "testharness" @@ -653656,14 +653161,6 @@ "9ce1de38843b358434a917f1c992c99d0c7fd9fb", "support" ], - "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-downgrade.http.html": [ - "d968e31f46203b4105784b40690961365662d3d6", - "testharness" - ], - "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-downgrade.http.html.headers": [ - "9ce1de38843b358434a917f1c992c99d0c7fd9fb", - "support" - ], "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-insecure.http.html": [ "d968e31f46203b4105784b40690961365662d3d6", "testharness" @@ -653672,22 +653169,6 @@ "9ce1de38843b358434a917f1c992c99d0c7fd9fb", "support" ], - "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-upgrade.http.html": [ - "d968e31f46203b4105784b40690961365662d3d6", - "testharness" - ], - "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-upgrade.http.html.headers": [ - "9ce1de38843b358434a917f1c992c99d0c7fd9fb", - "support" - ], - "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/same-origin-downgrade.http.html": [ - "cde3c4dcb62cb95d327c2203968ef4e5b5cc174f", - "testharness" - ], - "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/same-origin-downgrade.http.html.headers": [ - "9ce1de38843b358434a917f1c992c99d0c7fd9fb", - "support" - ], "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/same-origin-upgrade.http.html": [ "cde3c4dcb62cb95d327c2203968ef4e5b5cc174f", "testharness" @@ -653696,14 +653177,6 @@ "9ce1de38843b358434a917f1c992c99d0c7fd9fb", "support" ], - "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/no-redirect/same-origin-downgrade.http.html": [ - "69e0ac3f3922c48c41c57b7300865e08a7fdb6e7", - "testharness" - ], - "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/no-redirect/same-origin-downgrade.http.html.headers": [ - "9ce1de38843b358434a917f1c992c99d0c7fd9fb", - "support" - ], "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/no-redirect/same-origin-upgrade.http.html": [ "69e0ac3f3922c48c41c57b7300865e08a7fdb6e7", "testharness" @@ -653712,14 +653185,6 @@ "9ce1de38843b358434a917f1c992c99d0c7fd9fb", "support" ], - "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-downgrade.http.html": [ - "f9f5cbfc2e0ecf380f62f04c4f9bf2ffb6e10534", - "testharness" - ], - "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-downgrade.http.html.headers": [ - "9ce1de38843b358434a917f1c992c99d0c7fd9fb", - "support" - ], "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-insecure.http.html": [ "f9f5cbfc2e0ecf380f62f04c4f9bf2ffb6e10534", "testharness" @@ -653728,14 +653193,6 @@ "9ce1de38843b358434a917f1c992c99d0c7fd9fb", "support" ], - "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-upgrade.http.html": [ - "f9f5cbfc2e0ecf380f62f04c4f9bf2ffb6e10534", - "testharness" - ], - "referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-upgrade.http.html.headers": [ - "9ce1de38843b358434a917f1c992c99d0c7fd9fb", - "support" - ], "referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/a-tag/no-redirect/cross-origin.http.html": [ "6a1e8da86f081b700f2e6192b0852450d972108f", "testharness" @@ -653952,154 +653409,70 @@ "ef09fe30ce3da89607db242df4e06990b1ab26f2", "testharness" ], - "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/a-tag/no-redirect/same-origin-downgrade.http.html": [ - "2111a0cf7c5bb0529561706867d66a4819335b6e", - "testharness" - ], "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/a-tag/no-redirect/same-origin-upgrade.http.html": [ "2111a0cf7c5bb0529561706867d66a4819335b6e", "testharness" ], - "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/keep-origin-redirect/same-origin-downgrade.http.html": [ - "f0adebf34b3c564d4badce6964258047c0c96bf4", - "testharness" - ], "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/keep-origin-redirect/same-origin-upgrade.http.html": [ "f0adebf34b3c564d4badce6964258047c0c96bf4", "testharness" ], - "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/no-redirect/same-origin-downgrade.http.html": [ - "4d5714f87f1b4be87e3aee22b2c326d56206ef87", - "testharness" - ], "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/no-redirect/same-origin-upgrade.http.html": [ "4d5714f87f1b4be87e3aee22b2c326d56206ef87", "testharness" ], - "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-downgrade.http.html": [ - "6578bd1e63116f370364f72ebfbc9db3d64f45c5", - "testharness" - ], "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-insecure.http.html": [ "6578bd1e63116f370364f72ebfbc9db3d64f45c5", "testharness" ], - "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-upgrade.http.html": [ - "6578bd1e63116f370364f72ebfbc9db3d64f45c5", - "testharness" - ], - "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/same-origin-downgrade.http.html": [ - "94802477e7b3e3a18e73384e4cca72eca117757c", - "testharness" - ], "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/same-origin-upgrade.http.html": [ "94802477e7b3e3a18e73384e4cca72eca117757c", "testharness" ], - "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/no-redirect/same-origin-downgrade.http.html": [ - "a4298049e507656615a75676b31a6524572462d6", - "testharness" - ], "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/no-redirect/same-origin-upgrade.http.html": [ "a4298049e507656615a75676b31a6524572462d6", "testharness" ], - "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-downgrade.http.html": [ - "548e63ea9741e8cc94287be956bb3cb65cacc35e", - "testharness" - ], "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-insecure.http.html": [ "548e63ea9741e8cc94287be956bb3cb65cacc35e", "testharness" ], - "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-upgrade.http.html": [ - "548e63ea9741e8cc94287be956bb3cb65cacc35e", - "testharness" - ], - "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/keep-origin-redirect/same-origin-downgrade.http.html": [ - "32da6f1eaae40569e070e30c7ad931bd1b0cad11", - "testharness" - ], "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/keep-origin-redirect/same-origin-upgrade.http.html": [ "32da6f1eaae40569e070e30c7ad931bd1b0cad11", "testharness" ], - "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/no-redirect/same-origin-downgrade.http.html": [ - "c7367f7065972721dff937e3d7a1c92b1e1e826d", - "testharness" - ], "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/no-redirect/same-origin-upgrade.http.html": [ "c7367f7065972721dff937e3d7a1c92b1e1e826d", "testharness" ], - "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-downgrade.http.html": [ - "a0e33c7205f12e0e3f6cefa85e4bbec50fa41cf1", - "testharness" - ], "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-insecure.http.html": [ "a0e33c7205f12e0e3f6cefa85e4bbec50fa41cf1", "testharness" ], - "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-upgrade.http.html": [ - "a0e33c7205f12e0e3f6cefa85e4bbec50fa41cf1", - "testharness" - ], - "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/keep-origin-redirect/same-origin-downgrade.http.html": [ - "c80a3c7e52f608695d03587f8b1f9c8d3f3ed0b8", - "testharness" - ], "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/keep-origin-redirect/same-origin-upgrade.http.html": [ "c80a3c7e52f608695d03587f8b1f9c8d3f3ed0b8", "testharness" ], - "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/no-redirect/same-origin-downgrade.http.html": [ - "e7e65e19ec66aa167cd0cfd6d8ea8ec6f5cd366f", - "testharness" - ], "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/no-redirect/same-origin-upgrade.http.html": [ "e7e65e19ec66aa167cd0cfd6d8ea8ec6f5cd366f", "testharness" ], - "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-downgrade.http.html": [ - "42ecdbc0fd8be472b52e9c0f72350b8cd5e99aa1", - "testharness" - ], "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-insecure.http.html": [ "42ecdbc0fd8be472b52e9c0f72350b8cd5e99aa1", "testharness" ], - "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-upgrade.http.html": [ - "42ecdbc0fd8be472b52e9c0f72350b8cd5e99aa1", - "testharness" - ], - "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/keep-origin-redirect/same-origin-downgrade.http.html": [ - "c6dcc471c47de7379cde919a60beac5acd14325a", - "testharness" - ], "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/keep-origin-redirect/same-origin-upgrade.http.html": [ "c6dcc471c47de7379cde919a60beac5acd14325a", "testharness" ], - "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/no-redirect/same-origin-downgrade.http.html": [ - "53505abe07c2dc804067e14f9d020e6158efda5f", - "testharness" - ], "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/no-redirect/same-origin-upgrade.http.html": [ "53505abe07c2dc804067e14f9d020e6158efda5f", "testharness" ], - "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-downgrade.http.html": [ - "76b1b2df5fa373a09483837f4e3b9257630d483d", - "testharness" - ], "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-insecure.http.html": [ "76b1b2df5fa373a09483837f4e3b9257630d483d", "testharness" ], - "referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-upgrade.http.html": [ - "76b1b2df5fa373a09483837f4e3b9257630d483d", - "testharness" - ], "referrer-policy/origin/attr-referrer/cross-origin/http-http/a-tag/no-redirect/generic.http.html": [ "290d81d821a60cbef0a407bda075d70cdd8ca43f", "testharness" @@ -655941,11 +655314,11 @@ "testharness" ], "referrer-policy/spec.src.json": [ - "f96eaf594e5c7404b654c4f378f8d80de6e6b427", + "97fbad62043c081e4696b13ee6a48fb31efc9eef", "support" ], "referrer-policy/spec_json.js": [ - "32a32fbc35d8579b7a34ca26b5003290ca45d882", + "d178c9f2346c3780c85d3e99dbe59b905677037a", "support" ], "referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-http/a-tag/no-redirect/cross-insecure.http.html": [ @@ -665404,6 +664777,10 @@ "5ba2531ff26a27f6309bce11d488d2ff77f563f3", "testharness" ], + "shadow-dom/offsetParent-across-shadow-boundaries.html": [ + "5491e2121336d1b59ef69198fd048a22acc80d46", + "testharness" + ], "shadow-dom/reference/empty.html": [ "0e76edd65b7baf5316fc9d0c4da59a3502e4c27a", "support" @@ -665752,6 +665129,10 @@ "f1dbfe6d1adbe7ef7663c5298692872897ce3e0c", "support" ], + "signed-exchange/check-cert-request.tentative.html": [ + "5a89066c012ad9ffedd2b4917550d017b04814f8", + "testharness" + ], "signed-exchange/fallback-to-another-sxg.tentative.html": [ "0dbbd4a84b2d6ee6713530640994f1eda3f9c324", "testharness" @@ -665780,6 +665161,18 @@ "d581d5987ea0f9d7c8164d680a4527f2ea519cd4", "support" ], + "signed-exchange/resources/check-cert-request.py": [ + "ce95f0699eb8b7d977fd22ecc484bed756d8da7f", + "support" + ], + "signed-exchange/resources/check-cert-request.sxg": [ + "05f1646cfeb72d4c697ec73cee8855b787667568", + "support" + ], + "signed-exchange/resources/check-cert-request.sxg.headers": [ + "ca41178420c5b2adf70c439435d40b6370535330", + "support" + ], "signed-exchange/resources/failure.html": [ "1071f082b771c0daab9e8130347622ec28b3a0ec", "support" @@ -665797,7 +665190,7 @@ "support" ], "signed-exchange/resources/generate-test-sxgs.sh": [ - "a31ce6810d33c5a82b4453b71cb7e4d8248e914e", + "8359a137b8f296654d687ecbb61dc5bba7dbfaf1", "support" ], "signed-exchange/resources/inner-url.html": [ @@ -665856,6 +665249,14 @@ "ca41178420c5b2adf70c439435d40b6370535330", "support" ], + "signed-exchange/resources/sxg-noncacheable.sxg": [ + "38be1eeb3aa041c267f7dc117314d5cb0a864cf2", + "support" + ], + "signed-exchange/resources/sxg-noncacheable.sxg.headers": [ + "ca41178420c5b2adf70c439435d40b6370535330", + "support" + ], "signed-exchange/resources/sxg-utf8-inner-url.sxg": [ "c8f8a94ef90bed5383bbfc5742759893a1d21798", "support" @@ -665904,6 +665305,10 @@ "50a9ce30d80f9e41b6993e368da9f6ac71045cc4", "testharness" ], + "signed-exchange/sxg-noncacheable.tentative.html": [ + "82c9fb0d0290e8c7d74cc23736bd00579004a53d", + "testharness" + ], "signed-exchange/sxg-prefetch-resource-timing.tentative.html": [ "f0dc477e730ed45e32c43b70ca546d9790b6839d", "testharness" @@ -675573,7 +674978,7 @@ "support" ], "tools/wptrunner/wptrunner/executors/executormarionette.py": [ - "d471b4ed6603075d0764aece41a5a5bbf40405f1", + "d69e998e2c302f1983bd43541054ba84b745bbe3", "support" ], "tools/wptrunner/wptrunner/executors/executoropera.py": [ @@ -676981,7 +676386,7 @@ "support" ], "upgrade-insecure-requests/support/testharness-helper.sub.js": [ - "383506a143713b75d43b2d8ee482a86c6f5efb78", + "8bf576c2abd43a0d26bf1370ae69e8828a5a0d7d", "support" ], "upgrade-insecure-requests/websocket-upgrade.https.html": [ @@ -678809,7 +678214,7 @@ "support" ], "web-animations/animation-model/animation-types/property-types.js": [ - "9382c6297b9bb07ae06f95fbd099bcda5727a85f", + "64a7eb4762754adf693074ee1bc7780c81ffbe3e", "support" ], "web-animations/animation-model/animation-types/visibility.html": [ @@ -681977,7 +681382,7 @@ "testharness" ], "webrtc/RTCDtlsTransport-state.html": [ - "283ab087f703e5cd43df92d6240ad7d7babe4f2c", + "fd7215fa4e162acaed2af563c83b5b0846af3dd5", "testharness" ], "webrtc/RTCIceCandidate-constructor.html": [ diff --git a/tests/wpt/metadata/css/css-backgrounds/background-image-centered-with-border-radius.html.ini b/tests/wpt/metadata/css/css-backgrounds/background-image-centered-with-border-radius.html.ini new file mode 100644 index 00000000000..24396c50056 --- /dev/null +++ b/tests/wpt/metadata/css/css-backgrounds/background-image-centered-with-border-radius.html.ini @@ -0,0 +1,2 @@ +[background-image-centered-with-border-radius.html] + expected: FAIL diff --git a/tests/wpt/metadata/css/css-fonts/variations/at-font-face-font-matching.html.ini b/tests/wpt/metadata/css/css-fonts/variations/at-font-face-font-matching.html.ini index 990f3fbd8c2..7851ab8dfa8 100644 --- a/tests/wpt/metadata/css/css-fonts/variations/at-font-face-font-matching.html.ini +++ b/tests/wpt/metadata/css/css-fonts/variations/at-font-face-font-matching.html.ini @@ -23,9 +23,6 @@ [Matching font-weight: '430' should prefer '450 460' over '500'] expected: FAIL - [Matching font-weight: '430' should prefer '500' over '400 425'] - expected: FAIL - [Matching font-weight: '430' should prefer '400 425' over '350 399'] expected: FAIL diff --git a/tests/wpt/metadata/css/css-transitions/transitions-animatable-properties-01.html.ini b/tests/wpt/metadata/css/css-transitions/transitions-animatable-properties-01.html.ini index 1c8f983cd37..8850ec200da 100644 --- a/tests/wpt/metadata/css/css-transitions/transitions-animatable-properties-01.html.ini +++ b/tests/wpt/metadata/css/css-transitions/transitions-animatable-properties-01.html.ini @@ -74,6 +74,3 @@ [opacity end] expected: FAIL - [outline-width end] - expected: FAIL - diff --git a/tests/wpt/metadata/encoding/encodeInto.any.js.ini b/tests/wpt/metadata/encoding/encodeInto.any.js.ini new file mode 100644 index 00000000000..aef7fbebc07 --- /dev/null +++ b/tests/wpt/metadata/encoding/encodeInto.any.js.ini @@ -0,0 +1,261 @@ +[encodeInto.any.html] + [encodeInto() with 𝌆A and destination length 3, offset 4, filler 128] + expected: FAIL + + [encodeInto() with ¥¥ and destination length 4, offset 4, filler 128] + expected: FAIL + + [encodeInto() with ¥¥ and destination length 4, offset 0, filler random] + expected: FAIL + + [encodeInto() with 𝌆A and destination length 3, offset 4, filler 0] + expected: FAIL + + [encodeInto() with ¥¥ and destination length 4, offset 4, filler random] + expected: FAIL + + [encodeInto() with A� and destination length 4, offset 0, filler 128] + expected: FAIL + + [encodeInto() with 𝌆 and destination length 4, offset 0, filler 128] + expected: FAIL + + [encodeInto() with A� and destination length 4, offset 0, filler random] + expected: FAIL + + [encodeInto() with �A�A¥Hi and destination length 10, offset 0, filler random] + expected: FAIL + + [encodeInto() with 𝌆A and destination length 3, offset 0, filler random] + expected: FAIL + + [encodeInto() with A and destination length 10, offset 0, filler random] + expected: FAIL + + [encodeInto() with A and destination length 10, offset 0, filler 128] + expected: FAIL + + [encodeInto() with A and destination length 10, offset 0, filler 0] + expected: FAIL + + [encodeInto() with Hi and destination length 0, offset 0, filler 128] + expected: FAIL + + [encodeInto() with �A�A¥Hi and destination length 10, offset 0, filler 0] + expected: FAIL + + [encodeInto() with A� and destination length 4, offset 4, filler 128] + expected: FAIL + + [encodeInto() with 𝌆 and destination length 4, offset 4, filler random] + expected: FAIL + + [encodeInto() with 𝌆A and destination length 3, offset 0, filler 0] + expected: FAIL + + [encodeInto() with �A�A¥Hi and destination length 10, offset 4, filler 128] + expected: FAIL + + [encodeInto() with A and destination length 10, offset 4, filler 0] + expected: FAIL + + [encodeInto() cannot operate on a detached buffer] + expected: FAIL + + [encodeInto() with Hi and destination length 0, offset 0, filler random] + expected: FAIL + + [encodeInto() with A� and destination length 4, offset 4, filler 0] + expected: FAIL + + [encodeInto() with �A�A¥Hi and destination length 10, offset 0, filler 128] + expected: FAIL + + [encodeInto() with Hi and destination length 0, offset 4, filler random] + expected: FAIL + + [encodeInto() with ¥¥ and destination length 4, offset 4, filler 0] + expected: FAIL + + [encodeInto() with A� and destination length 4, offset 4, filler random] + expected: FAIL + + [encodeInto() with Hi and destination length 0, offset 0, filler 0] + expected: FAIL + + [encodeInto() with Hi and destination length 0, offset 4, filler 0] + expected: FAIL + + [encodeInto() with 𝌆 and destination length 4, offset 0, filler random] + expected: FAIL + + [encodeInto() with Hi and destination length 0, offset 4, filler 128] + expected: FAIL + + [encodeInto() with �A�A¥Hi and destination length 10, offset 4, filler 0] + expected: FAIL + + [encodeInto() with ¥¥ and destination length 4, offset 0, filler 128] + expected: FAIL + + [encodeInto() with A� and destination length 4, offset 0, filler 0] + expected: FAIL + + [encodeInto() with 𝌆 and destination length 4, offset 0, filler 0] + expected: FAIL + + [encodeInto() with �A�A¥Hi and destination length 10, offset 4, filler random] + expected: FAIL + + [encodeInto() with A and destination length 10, offset 4, filler 128] + expected: FAIL + + [encodeInto() with ¥¥ and destination length 4, offset 0, filler 0] + expected: FAIL + + [encodeInto() with 𝌆A and destination length 3, offset 0, filler 128] + expected: FAIL + + [encodeInto() with 𝌆 and destination length 4, offset 4, filler 0] + expected: FAIL + + [encodeInto() with 𝌆A and destination length 3, offset 4, filler random] + expected: FAIL + + [encodeInto() with 𝌆 and destination length 4, offset 4, filler 128] + expected: FAIL + + [encodeInto() with A and destination length 10, offset 4, filler random] + expected: FAIL + + +[encodeInto.any.worker.html] + [encodeInto() with 𝌆A and destination length 3, offset 4, filler 128] + expected: FAIL + + [encodeInto() with ¥¥ and destination length 4, offset 4, filler 128] + expected: FAIL + + [encodeInto() with ¥¥ and destination length 4, offset 0, filler random] + expected: FAIL + + [encodeInto() with 𝌆A and destination length 3, offset 4, filler 0] + expected: FAIL + + [encodeInto() with ¥¥ and destination length 4, offset 4, filler random] + expected: FAIL + + [encodeInto() with A� and destination length 4, offset 0, filler 128] + expected: FAIL + + [encodeInto() with 𝌆 and destination length 4, offset 0, filler 128] + expected: FAIL + + [encodeInto() with A� and destination length 4, offset 0, filler random] + expected: FAIL + + [encodeInto() with �A�A¥Hi and destination length 10, offset 0, filler random] + expected: FAIL + + [encodeInto() with 𝌆A and destination length 3, offset 0, filler random] + expected: FAIL + + [encodeInto() with A and destination length 10, offset 0, filler random] + expected: FAIL + + [encodeInto() with A and destination length 10, offset 0, filler 128] + expected: FAIL + + [encodeInto() with A and destination length 10, offset 0, filler 0] + expected: FAIL + + [encodeInto() with Hi and destination length 0, offset 0, filler 128] + expected: FAIL + + [encodeInto() with �A�A¥Hi and destination length 10, offset 0, filler 0] + expected: FAIL + + [encodeInto() with A� and destination length 4, offset 4, filler 128] + expected: FAIL + + [encodeInto() with 𝌆 and destination length 4, offset 4, filler random] + expected: FAIL + + [encodeInto() with 𝌆A and destination length 3, offset 0, filler 0] + expected: FAIL + + [encodeInto() with �A�A¥Hi and destination length 10, offset 4, filler 128] + expected: FAIL + + [encodeInto() with A and destination length 10, offset 4, filler 0] + expected: FAIL + + [encodeInto() cannot operate on a detached buffer] + expected: FAIL + + [encodeInto() with Hi and destination length 0, offset 0, filler random] + expected: FAIL + + [encodeInto() with A� and destination length 4, offset 4, filler 0] + expected: FAIL + + [encodeInto() with �A�A¥Hi and destination length 10, offset 0, filler 128] + expected: FAIL + + [encodeInto() with Hi and destination length 0, offset 4, filler random] + expected: FAIL + + [encodeInto() with ¥¥ and destination length 4, offset 4, filler 0] + expected: FAIL + + [encodeInto() with A� and destination length 4, offset 4, filler random] + expected: FAIL + + [encodeInto() with Hi and destination length 0, offset 0, filler 0] + expected: FAIL + + [encodeInto() with Hi and destination length 0, offset 4, filler 0] + expected: FAIL + + [encodeInto() with 𝌆 and destination length 4, offset 0, filler random] + expected: FAIL + + [encodeInto() with Hi and destination length 0, offset 4, filler 128] + expected: FAIL + + [encodeInto() with �A�A¥Hi and destination length 10, offset 4, filler 0] + expected: FAIL + + [encodeInto() with ¥¥ and destination length 4, offset 0, filler 128] + expected: FAIL + + [encodeInto() with A� and destination length 4, offset 0, filler 0] + expected: FAIL + + [encodeInto() with 𝌆 and destination length 4, offset 0, filler 0] + expected: FAIL + + [encodeInto() with �A�A¥Hi and destination length 10, offset 4, filler random] + expected: FAIL + + [encodeInto() with A and destination length 10, offset 4, filler 128] + expected: FAIL + + [encodeInto() with ¥¥ and destination length 4, offset 0, filler 0] + expected: FAIL + + [encodeInto() with 𝌆A and destination length 3, offset 0, filler 128] + expected: FAIL + + [encodeInto() with 𝌆 and destination length 4, offset 4, filler 0] + expected: FAIL + + [encodeInto() with 𝌆A and destination length 3, offset 4, filler random] + expected: FAIL + + [encodeInto() with 𝌆 and destination length 4, offset 4, filler 128] + expected: FAIL + + [encodeInto() with A and destination length 10, offset 4, filler random] + expected: FAIL + diff --git a/tests/wpt/metadata/encoding/single-byte-decoder.html.ini b/tests/wpt/metadata/encoding/single-byte-decoder.html.ini index 877c5d2c7ba..83141496741 100644 --- a/tests/wpt/metadata/encoding/single-byte-decoder.html.ini +++ b/tests/wpt/metadata/encoding/single-byte-decoder.html.ini @@ -2,7 +2,7 @@ type: testharness [single-byte-decoder.html?document] - expected: TIMEOUT + expected: CRASH [ISO-8859-4: iso_8859-4:1988 (document.characterSet and document.inputEncoding)] expected: FAIL @@ -32,7 +32,7 @@ [single-byte-decoder.html?XMLHttpRequest] - expected: CRASH + expected: TIMEOUT [ISO-8859-2: iso_8859-2:1987 (XMLHttpRequest)] expected: FAIL @@ -55,7 +55,7 @@ expected: FAIL [windows-1252: iso_8859-1:1987 (XMLHttpRequest)] - expected: FAIL + expected: TIMEOUT [windows-1254: iso_8859-9:1989 (XMLHttpRequest)] expected: TIMEOUT @@ -141,5 +141,44 @@ [windows-1254: cp1254 (XMLHttpRequest)] expected: TIMEOUT + [windows-1252: iso88591 (XMLHttpRequest)] + expected: TIMEOUT + + [windows-1252: ibm819 (XMLHttpRequest)] + expected: TIMEOUT + + [windows-1252: iso_8859-1 (XMLHttpRequest)] + expected: TIMEOUT + + [windows-1252: latin1 (XMLHttpRequest)] + expected: TIMEOUT + + [windows-1253: cp1253 (XMLHttpRequest)] + expected: TIMEOUT + + [windows-1252: csisolatin1 (XMLHttpRequest)] + expected: TIMEOUT + + [windows-1252: iso8859-1 (XMLHttpRequest)] + expected: TIMEOUT + + [windows-1252: x-cp1252 (XMLHttpRequest)] + expected: TIMEOUT + + [windows-1252: l1 (XMLHttpRequest)] + expected: TIMEOUT + + [windows-1252: iso-8859-1 (XMLHttpRequest)] + expected: TIMEOUT + + [windows-1252: windows-1252 (XMLHttpRequest)] + expected: TIMEOUT + + [windows-1252: iso-ir-100 (XMLHttpRequest)] + expected: TIMEOUT + + [windows-1252: us-ascii (XMLHttpRequest)] + expected: TIMEOUT + [single-byte-decoder.html?TextDecoder] diff --git a/tests/wpt/metadata/html/browsers/history/the-history-interface/traverse_the_history_5.html.ini b/tests/wpt/metadata/html/browsers/history/the-history-interface/traverse_the_history_4.html.ini index dc2e45516de..385376c7321 100644 --- a/tests/wpt/metadata/html/browsers/history/the-history-interface/traverse_the_history_5.html.ini +++ b/tests/wpt/metadata/html/browsers/history/the-history-interface/traverse_the_history_4.html.ini @@ -1,4 +1,4 @@ -[traverse_the_history_5.html] +[traverse_the_history_4.html] [Multiple history traversals, last would be aborted] expected: FAIL diff --git a/tests/wpt/metadata/html/semantics/embedded-content/the-img-element/environment-changes/viewport-change.html.ini b/tests/wpt/metadata/html/semantics/embedded-content/the-img-element/environment-changes/viewport-change.html.ini index e16c5dbd9b0..bed3bccce25 100644 --- a/tests/wpt/metadata/html/semantics/embedded-content/the-img-element/environment-changes/viewport-change.html.ini +++ b/tests/wpt/metadata/html/semantics/embedded-content/the-img-element/environment-changes/viewport-change.html.ini @@ -5,7 +5,7 @@ expected: TIMEOUT [picture: source (max-width:500px) valid image, img valid image, resize to wide] - expected: FAIL + expected: TIMEOUT [picture: source (max-width:500px) valid image, img broken image, resize to narrow] expected: TIMEOUT @@ -13,12 +13,3 @@ [picture: source (max-width:500px) valid image, img valid image, resize to narrow] expected: FAIL - [picture: source (max-width:500px) broken image, img valid image, resize to narrow] - expected: FAIL - - [img (srcset 1 cand) valid image, resize to narrow] - expected: FAIL - - [picture: same URL in source (max-width:500px) and img, resize to narrow] - expected: FAIL - diff --git a/tests/wpt/metadata/html/semantics/embedded-content/the-img-element/sizes/sizes-dynamic-002.html.ini b/tests/wpt/metadata/html/semantics/embedded-content/the-img-element/sizes/sizes-dynamic-002.html.ini new file mode 100644 index 00000000000..66c6379adef --- /dev/null +++ b/tests/wpt/metadata/html/semantics/embedded-content/the-img-element/sizes/sizes-dynamic-002.html.ini @@ -0,0 +1,2 @@ +[sizes-dynamic-002.html] + expected: TIMEOUT diff --git a/tests/wpt/metadata/html/semantics/interactive-elements/the-details-element/toggleEvent.html.ini b/tests/wpt/metadata/html/semantics/interactive-elements/the-details-element/toggleEvent.html.ini deleted file mode 100644 index 9e522297c94..00000000000 --- a/tests/wpt/metadata/html/semantics/interactive-elements/the-details-element/toggleEvent.html.ini +++ /dev/null @@ -1,7 +0,0 @@ -[toggleEvent.html] - [Calling open twice on 'details' fires only one toggle event] - expected: FAIL - - [Setting open=true to opened 'details' element should not fire a toggle event at the 'details' element] - expected: FAIL - diff --git a/tests/wpt/metadata/html/webappapis/scripting/processing-model-2/unhandled-promise-rejections/promise-rejection-events.html.ini b/tests/wpt/metadata/html/webappapis/scripting/processing-model-2/unhandled-promise-rejections/promise-rejection-events.html.ini deleted file mode 100644 index 63682614c4f..00000000000 --- a/tests/wpt/metadata/html/webappapis/scripting/processing-model-2/unhandled-promise-rejections/promise-rejection-events.html.ini +++ /dev/null @@ -1,5 +0,0 @@ -[promise-rejection-events.html] - expected: TIMEOUT - [rejectionhandled is dispatched from a queued task, and not immediately] - expected: TIMEOUT - diff --git a/tests/wpt/metadata/workers/semantics/multiple-workers/005.html.ini b/tests/wpt/metadata/workers/semantics/multiple-workers/005.html.ini index f584fce5df1..268949ced5c 100644 --- a/tests/wpt/metadata/workers/semantics/multiple-workers/005.html.ini +++ b/tests/wpt/metadata/workers/semantics/multiple-workers/005.html.ini @@ -1,5 +1,4 @@ [005.html] - expected: ERROR [dedicated worker in shared worker in dedicated worker] expected: FAIL diff --git a/tests/wpt/mozilla/meta/mozilla/paint_timing.html.ini b/tests/wpt/mozilla/meta/mozilla/paint_timing.html.ini new file mode 100644 index 00000000000..14a9e778f39 --- /dev/null +++ b/tests/wpt/mozilla/meta/mozilla/paint_timing.html.ini @@ -0,0 +1,4 @@ +[paint_timing.html] + [Performance entries observer] + expected: FAIL + diff --git a/tests/wpt/web-platform-tests/.azure-pipelines.yml b/tests/wpt/web-platform-tests/.azure-pipelines.yml index 9ddcd25654b..773ff6cc5f9 100644 --- a/tests/wpt/web-platform-tests/.azure-pipelines.yml +++ b/tests/wpt/web-platform-tests/.azure-pipelines.yml @@ -10,13 +10,12 @@ # of this repository" setting must also be enabled in the Azure DevOps project: # https://docs.microsoft.com/en-us/azure/devops/pipelines/repos/github#validate-contributions-from-forks -trigger: none # disable builds for branches - jobs: # The affected tests jobs are unconditional for speed, as most PRs have one or # more affected tests: https://github.com/web-platform-tests/wpt/issues/13936. - job: affected_macOS displayName: 'affected tests (Safari Technology Preview)' + condition: eq(variables['Build.Reason'], 'PullRequest') pool: vmImage: 'macOS-10.13' steps: @@ -26,6 +25,7 @@ jobs: - job: affected_without_changes_macOS displayName: 'affected tests without changes (Safari Technology Preview)' + condition: eq(variables['Build.Reason'], 'PullRequest') pool: vmImage: 'macOS-10.13' steps: @@ -39,6 +39,7 @@ jobs: # and all following jobs wait for it to finish and depend on its output. - job: decision displayName: './wpt test-jobs' + condition: eq(variables['Build.Reason'], 'PullRequest') pool: vmImage: 'ubuntu-16.04' steps: @@ -121,3 +122,29 @@ jobs: - template: tools/ci/azure/tox_pytest.yml parameters: directory: tools/wpt/ + +- job: all_macOS + displayName: 'all tests (Safari Technology Preview)' + condition: eq(variables['Build.SourceBranch'], 'refs/heads/epochs/daily') + strategy: + parallel: 4 # chosen to make runtime ~2h + timeoutInMinutes: 360 + pool: + vmImage: 'macOS-10.13' + steps: + - template: tools/ci/azure/checkout.yml + - template: tools/ci/azure/pip_install.yml + parameters: + packages: virtualenv + - template: tools/ci/azure/install_fonts.yml + - template: tools/ci/azure/install_certs.yml + - template: tools/ci/azure/install_safari.yml + - template: tools/ci/azure/update_hosts.yml + - template: tools/ci/azure/update_manifest.yml + - script: no_proxy='*' ./wpt run --no-manifest-update --no-restart-on-unexpected --no-fail-on-unexpected --this-chunk=$(System.JobPositionInPhase) --total-chunks=$(System.TotalJobsInPhase) --chunk-type hash --log-wptreport $(Build.ArtifactStagingDirectory)/wpt_report_$(System.JobPositionInPhase).json --channel preview safari + displayName: 'Run tests' + - task: PublishBuildArtifacts@1 + displayName: 'Publish results' + inputs: + artifactName: 'results' + condition: succeededOrFailed() diff --git a/tests/wpt/web-platform-tests/2dcontext/drawing-images-to-the-canvas/drawimage_svg_image_with_foreign_object_does_not_taint.html b/tests/wpt/web-platform-tests/2dcontext/drawing-images-to-the-canvas/drawimage_svg_image_with_foreign_object_does_not_taint.html new file mode 100644 index 00000000000..f29b2bf5a8a --- /dev/null +++ b/tests/wpt/web-platform-tests/2dcontext/drawing-images-to-the-canvas/drawimage_svg_image_with_foreign_object_does_not_taint.html @@ -0,0 +1,32 @@ +<!DOCTYPE html> +<meta charset="utf-8"> +<title>Draw an SVG image with a foreignObject to a canvas</title> +<script src="/resources/testharness.js"></script> +<script src="/resources/testharnessreport.js"></script> +<script> +function loadImage(url) { + return new Promise(resolve => { + const image = new window.Image(); + image.onload = () => { + resolve(image); + }; + image.src = url; + }); +} + +promise_test(async (t) => { + // Load a data URL for an SVG image with a foreign object. + const url = 'data:image/svg+xml,<svg xmlns="http://www.w3.org/2000/svg" width="100" height="100"><foreignObject></foreignObject></svg>'; + const image = await loadImage(url); + + // Draw the image to a canvas. + const canvas = document.createElement('canvas'); + const context = canvas.getContext('2d'); + canvas.width = image.width; + canvas.height = image.height; + context.drawImage(image, 0, 0); + + // The canvas should not be tainted, so the following shouldn't throw. + assert_true(canvas.toDataURL().length > 0); +}, 'Canvas should not be tainted after drawing SVG including <foreignObject>'); +</script> diff --git a/tests/wpt/web-platform-tests/bluetooth/META.yml b/tests/wpt/web-platform-tests/bluetooth/META.yml index c93f16a3a5f..501396bac74 100644 --- a/tests/wpt/web-platform-tests/bluetooth/META.yml +++ b/tests/wpt/web-platform-tests/bluetooth/META.yml @@ -1,5 +1,6 @@ spec: https://webbluetoothcg.github.io/web-bluetooth/ suggested_reviewers: - - jyasskin + - dougt - g-ortuno - - scheib + - odejesush + - reillyeon diff --git a/tests/wpt/web-platform-tests/css/compositing/inheritance.html b/tests/wpt/web-platform-tests/css/compositing/inheritance.html new file mode 100644 index 00000000000..8bd08672edf --- /dev/null +++ b/tests/wpt/web-platform-tests/css/compositing/inheritance.html @@ -0,0 +1,23 @@ +<!DOCTYPE html> +<html> +<head> +<meta charset="utf-8"> +<title>Inheritance of Compositing and Blending properties</title> +<link rel="help" href="https://drafts.fxtf.org/compositing-1/#property-index"> +<meta name="assert" content="Properties do not inherit."> +<meta name="assert" content="Properties have initial values according to the spec."> +<script src="/resources/testharness.js"></script> +<script src="/resources/testharnessreport.js"></script> +<script src="/css/support/inheritance-testcommon.js"></script> +</head> +<body> +<div id="container"> + <div id="target"></div> +</div> +<script> +assert_not_inherited('background-blend-mode', 'normal', 'multiply'); +assert_not_inherited('isolation', 'auto', 'isolate'); +assert_not_inherited('mix-blend-mode', 'normal', 'overlay'); +</script> +</body> +</html> diff --git a/tests/wpt/web-platform-tests/css/css-backgrounds/background-image-centered-with-border-radius.html b/tests/wpt/web-platform-tests/css/css-backgrounds/background-image-centered-with-border-radius.html new file mode 100644 index 00000000000..602cd48aaa9 --- /dev/null +++ b/tests/wpt/web-platform-tests/css/css-backgrounds/background-image-centered-with-border-radius.html @@ -0,0 +1,24 @@ +<!DOCTYPE html> +<html> +<head> + <title>CSS Background Test: Centered background image with border radius</title> + <link rel="author" title="schenney" href="mailto:schenney@chromium.org"> + <link rel="help" href="http://www.w3.org/TR/css3-background"> + <link rel="match" href="reference/background-image-centered-with-border-radius-ref.html"> + <style> + span { + background: url(support/green-60x60-red-5px-border.png) no-repeat center; + border: 5px solid green; + border-radius: 5px; + box-sizing: border-box; + display: inline-block; + height: 60px; + width: 60px; + } + </style> +</head> + +<body> + <span></span> +</body> +</html> diff --git a/tests/wpt/web-platform-tests/css/css-backgrounds/background-image-first-line.html b/tests/wpt/web-platform-tests/css/css-backgrounds/background-image-first-line.html deleted file mode 100644 index c8dee7050b6..00000000000 --- a/tests/wpt/web-platform-tests/css/css-backgrounds/background-image-first-line.html +++ /dev/null @@ -1,19 +0,0 @@ -<!DOCTYPE html> -<title>CSS Test: background-image applicability to ::first-letter</title> -<link rel="help" href="http://www.w3.org/TR/css3-background/"> -<link rel="help" href="http://www.w3.org/TR/CSS21/selector.html#first-line-pseudo"> -<link rel="match" href="reference/background-image-first-line-ref.html"> -<meta name="flags" content="ahem image"> -<meta name="assert" content="background-image applicability to ::first-line"> -<style type="text/css"> -#content { - color: transparent; - font: 100px Ahem; -} -#content::first-line { - background-image: url("support/cat.png"); /* 98 w. by 99px h. */ - background-repeat: no-repeat; -} -</style> -<p>Test passes if cat image is visible.</p> -<div id="content">X</div> diff --git a/tests/wpt/web-platform-tests/css/css-backgrounds/reference/background-image-centered-with-border-radius-ref.html b/tests/wpt/web-platform-tests/css/css-backgrounds/reference/background-image-centered-with-border-radius-ref.html new file mode 100644 index 00000000000..44db3f56017 --- /dev/null +++ b/tests/wpt/web-platform-tests/css/css-backgrounds/reference/background-image-centered-with-border-radius-ref.html @@ -0,0 +1,22 @@ +<!DOCTYPE html> +<html> +<head> + <title>CSS Background Test Reference</title> + <link rel="author" title="schenney" href="mailto:schenney@chromium.org"> + <style> + span { + background-color: green; + display: inline-block; + height: 60px; + width: 60px; + border: 5px solid green; + border-radius: 5px; + box-sizing: border-box; + } + </style> +</head> + +<body> + <span></span> +</body> +</html> diff --git a/tests/wpt/web-platform-tests/css/css-backgrounds/reference/background-image-first-line-ref.html b/tests/wpt/web-platform-tests/css/css-backgrounds/reference/background-image-first-line-ref.html deleted file mode 100644 index 82fd9a2d3d0..00000000000 --- a/tests/wpt/web-platform-tests/css/css-backgrounds/reference/background-image-first-line-ref.html +++ /dev/null @@ -1,12 +0,0 @@ -<!DOCTYPE html> -<meta name="flags" content="ahem image"> -<style type="text/css"> -#content { - color: transparent; - font: 100px Ahem; - background-image: url("../support/cat.png"); /* 98 w. by 99px h. */ - background-repeat: no-repeat; -} -</style> -<p>Test passes if cat image is visible.</p> -<div id="content">X</div> diff --git a/tests/wpt/web-platform-tests/css/css-backgrounds/support/green-60x60-red-5px-border.png b/tests/wpt/web-platform-tests/css/css-backgrounds/support/green-60x60-red-5px-border.png Binary files differnew file mode 100644 index 00000000000..97a94592dd5 --- /dev/null +++ b/tests/wpt/web-platform-tests/css/css-backgrounds/support/green-60x60-red-5px-border.png diff --git a/tests/wpt/web-platform-tests/encoding/encodeInto.any.js b/tests/wpt/web-platform-tests/encoding/encodeInto.any.js new file mode 100644 index 00000000000..2abc69744d7 --- /dev/null +++ b/tests/wpt/web-platform-tests/encoding/encodeInto.any.js @@ -0,0 +1,144 @@ +[ + { + "input": "Hi", + "read": 0, + "destinationLength": 0, + "written": [] + }, + { + "input": "A", + "read": 1, + "destinationLength": 10, + "written": [0x41] + }, + { + "input": "\u{1D306}", // "\uD834\uDF06" + "read": 2, + "destinationLength": 4, + "written": [0xF0, 0x9D, 0x8C, 0x86] + }, + { + "input": "\u{1D306}A", + "read": 0, + "destinationLength": 3, + "written": [] + }, + { + "input": "\uD834A\uDF06A¥Hi", + "read": 5, + "destinationLength": 10, + "written": [0xEF, 0xBF, 0xBD, 0x41, 0xEF, 0xBF, 0xBD, 0x41, 0xC2, 0xA5] + }, + { + "input": "A\uDF06", + "read": 2, + "destinationLength": 4, + "written": [0x41, 0xEF, 0xBF, 0xBD] + }, + { + "input": "¥¥", + "read": 2, + "destinationLength": 4, + "written": [0xC2, 0xA5, 0xC2, 0xA5] + } +].forEach(testData => { + [ + { + "bufferIncrease": 0, + "destinationOffset": 0, + "filler": 0 + }, + { + "bufferIncrease": 10, + "destinationOffset": 4, + "filler": 0 + }, + { + "bufferIncrease": 0, + "destinationOffset": 0, + "filler": 0x80 + }, + { + "bufferIncrease": 10, + "destinationOffset": 4, + "filler": 0x80 + }, + { + "bufferIncrease": 0, + "destinationOffset": 0, + "filler": "random" + }, + { + "bufferIncrease": 10, + "destinationOffset": 4, + "filler": "random" + } + ].forEach(destinationData => { + test(() => { + // Setup + const bufferLength = testData.destinationLength + destinationData.bufferIncrease, + destinationOffset = destinationData.destinationOffset, + destinationLength = testData.destinationLength, + destinationFiller = destinationData.filler, + encoder = new TextEncoder(), + buffer = new ArrayBuffer(bufferLength), + view = new Uint8Array(buffer, destinationOffset, destinationLength), + fullView = new Uint8Array(buffer), + control = new Array(bufferLength); + let byte = destinationFiller; + for (let i = 0; i < bufferLength; i++) { + if (destinationFiller === "random") { + byte = Math.floor(Math.random() * 256); + } + control[i] = byte; + fullView[i] = byte; + } + + // It's happening + const result = encoder.encodeInto(testData.input, view); + + // Basics + assert_equals(view.byteLength, destinationLength); + assert_equals(view.length, destinationLength); + + // Remainder + assert_equals(result.read, testData.read); + assert_equals(result.written, testData.written.length); + for (let i = 0; i < bufferLength; i++) { + if (i < destinationOffset || i >= (destinationOffset + testData.written.length)) { + assert_equals(fullView[i], control[i]); + } else { + assert_equals(fullView[i], testData.written[i - destinationOffset]); + } + } + }, "encodeInto() with " + testData.input + " and destination length " + testData.destinationLength + ", offset " + destinationData.destinationOffset + ", filler " + destinationData.filler); + }); +}); + +[DataView, + Int8Array, + Int16Array, + Int32Array, + Uint16Array, + Uint32Array, + Uint8ClampedArray, + Float32Array, + Float64Array].forEach(view => { + test(() => { + assert_throws(new TypeError(), () => new TextEncoder().encodeInto("", new view(new ArrayBuffer(0)))); + }, "Invalid encodeInto() destination: " + view); + }); + +test(() => { + assert_throws(new TypeError(), () => new TextEncoder().encodeInto("", new ArrayBuffer(10))); +}, "Invalid encodeInto() destination: ArrayBuffer"); + +test(() => { + const buffer = new ArrayBuffer(10), + view = new Uint8Array(buffer); + const { read, written } = new TextEncoder().encodeInto("", view); + assert_equals(read, 0); + assert_equals(written, 0); + self.postMessage(buffer, "/", [buffer]); + assert_throws(new TypeError(), () => new TextEncoder().encodeInto("", view)); +}, "encodeInto() cannot operate on a detached buffer"); diff --git a/tests/wpt/web-platform-tests/fetch/api/abort/general.any.js b/tests/wpt/web-platform-tests/fetch/api/abort/general.any.js index 11999cc9270..d6159c7e1b0 100644 --- a/tests/wpt/web-platform-tests/fetch/api/abort/general.any.js +++ b/tests/wpt/web-platform-tests/fetch/api/abort/general.any.js @@ -445,7 +445,7 @@ promise_test(async t => { const controller = new AbortController(); const signal = controller.signal; - const response = await fetch(`../resources/method.py`, { signal }); + const response = await fetch(`../resources/empty.txt`, { signal }); // Read whole response to ensure close signal has sent. await response.clone().text(); diff --git a/tests/wpt/web-platform-tests/html/semantics/embedded-content/the-img-element/sizes/sizes-dynamic-002.html b/tests/wpt/web-platform-tests/html/semantics/embedded-content/the-img-element/sizes/sizes-dynamic-002.html new file mode 100644 index 00000000000..6c64b3da392 --- /dev/null +++ b/tests/wpt/web-platform-tests/html/semantics/embedded-content/the-img-element/sizes/sizes-dynamic-002.html @@ -0,0 +1,33 @@ +<!doctype html> +<html class="reftest-wait"> +<title>Image intrinsic size specified via sizes attribute reacts properly to media changes in Shadow DOM</title> +<link rel="author" title="Emilio Cobos Álvarez" href="mailto:emilio@crisal.io"> +<link rel="match" href="sizes-dynamic-001-ref.html"> +<link rel="help" href="https://html.spec.whatwg.org/#sizes-attributes"> +<link rel="help" href="https://bugzilla.mozilla.org/show_bug.cgi?id=1149357"> +<script> +function frameLoaded(frame) { + let doc = frame.contentDocument; + let shadow = doc.getElementById("host").attachShadow({ mode: "open" }); + + let img = doc.createElement("img"); + img.srcset = "/images/green-256x256.png 100w"; + img.style.maxWidth = "100%"; + img.setAttribute("sizes", "(min-width: 400px) 10px, 20px"); + + img.onload = function() { + img.offsetWidth; // Flush layout. + + frame.width = "500"; + + // Trigger the viewport resize, which will trigger the image load task. + img.offsetWidth; + + // Wait for the image load task to run. + setTimeout(() => document.documentElement.removeAttribute("class"), 0); + }; + + shadow.appendChild(img); +} +</script> +<iframe onload="frameLoaded(this)" width="200" height="500" srcdoc='<!doctype html><div id="host"></div>'></iframe> diff --git a/tests/wpt/web-platform-tests/interfaces/webxr.idl b/tests/wpt/web-platform-tests/interfaces/webxr.idl index ea45aef9771..3054500f590 100644 --- a/tests/wpt/web-platform-tests/interfaces/webxr.idl +++ b/tests/wpt/web-platform-tests/interfaces/webxr.idl @@ -26,15 +26,15 @@ enum XREnvironmentBlendMode { [SecureContext, Exposed=Window] interface XRSession : EventTarget { // Attributes readonly attribute XRSessionMode mode; - readonly attribute XRPresentationContext outputContext; + readonly attribute XRPresentationContext? outputContext; readonly attribute XREnvironmentBlendMode environmentBlendMode; attribute double depthNear; attribute double depthFar; - attribute XRLayer baseLayer; + attribute XRLayer? baseLayer; // Methods - Promise<XRReferenceSpace> requestReferenceSpace(XRReferenceSpaceType type, optional XRReferenceSpaceOptions options); + Promise<XRReferenceSpace> requestReferenceSpace(XRReferenceSpaceOptions options); FrozenArray<XRInputSource> getInputSources(); @@ -61,7 +61,7 @@ enum XRSessionMode { dictionary XRSessionCreationOptions { XRSessionMode mode = "inline"; - XRPresentationContext outputContext; + XRPresentationContext? outputContext = null; }; callback XRFrameRequestCallback = void (DOMHighResTimeStamp time, XRFrame frame); @@ -88,6 +88,7 @@ dictionary XRReferenceSpaceOptions { }; [SecureContext, Exposed=Window] interface XRReferenceSpace : XRSpace { + attribute XRRigidTransform originOffset; attribute EventHandler onreset; }; diff --git a/tests/wpt/web-platform-tests/mediacapture-record/MediaRecorder-disabled-tracks.https.html b/tests/wpt/web-platform-tests/mediacapture-record/MediaRecorder-disabled-tracks.https.html new file mode 100644 index 00000000000..fe26e0c9616 --- /dev/null +++ b/tests/wpt/web-platform-tests/mediacapture-record/MediaRecorder-disabled-tracks.https.html @@ -0,0 +1,53 @@ +<!doctype html> +<html> +<head> + <title>MediaRecorder Disabled Tracks</title> + <link rel="help" href="https://w3c.github.io/mediacapture-record/MediaRecorder.html#mediarecorder"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> +</head> +<script> + + // This test verifies that MediaStream with disabled tracks can be correctly + // recorded. See crbug.com/878255 for more context. + + [ ["video-only", {video: true, audio: false}], + ["audio-only", {video: false, audio: true}], + ["audio-video", {video: true, audio: true}]] + .forEach( function(args) { + async_test(function(test) { + let recorder; + const recorderOnDataAvailable = test.step_func(function(event) { + if (recorder.state != "recording") + return; + + recorder.onstop = recorderOnStopExpected; + recorder.stop(); + }); + + const recorderOnStopExpected = test.step_func_done(); + const recorderOnStopUnexpected = test.unreached_func('Recording stopped.'); + const recorderOnError = test.unreached_func('Recording error.'); + + const gotStream = test.step_func(function(stream) { + for (track in stream.getTracks()) + track.enabled = false; + + recorder = new MediaRecorder(stream); + + assert_equals(recorder.state, "inactive"); + recorder.ondataavailable = recorderOnDataAvailable; + recorder.onstop = recorderOnStopUnexpected; + recorder.onerror = recorderOnError; + recorder.start(); + + assert_equals(recorder.state, "recording"); + recorder.requestData(); + }); + + const onError = test.unreached_func('Error creating MediaStream.'); + navigator.getUserMedia(args[1], gotStream, onError); + }, args[0]); + }); + +</script> diff --git a/tests/wpt/web-platform-tests/referrer-policy/generic/tools/generate.py b/tests/wpt/web-platform-tests/referrer-policy/generic/tools/generate.py index 30e5b6142f9..84aa9feab42 100755 --- a/tests/wpt/web-platform-tests/referrer-policy/generic/tools/generate.py +++ b/tests/wpt/web-platform-tests/referrer-policy/generic/tools/generate.py @@ -2,6 +2,7 @@ from __future__ import print_function +import copy import os, sys, json from common_paths import * import spec_validator @@ -142,21 +143,33 @@ def generate_test_source_files(spec_json, target): exclusion_dict[excluded_selection_path] = True for spec in specification: + # Used to make entries with expansion="override" override preceding + # entries with the same |selection_path|. + output_dict = {} + for spec_test_expansion in spec['test_expansion']: expansion = expand_test_expansion_pattern(spec_test_expansion, test_expansion_schema) for selection in permute_expansion(expansion): selection_path = selection_pattern % selection if not selection_path in exclusion_dict: - subresource_path = \ - spec_json["subresource_path"][selection["subresource"]] - generate_selection(selection, - spec, - subresource_path, - html_template) + if selection_path in output_dict: + if spec_test_expansion['expansion'] != 'override': + print("Error: %s's expansion is default but overrides %s" % (selection['name'], output_dict[selection_path]['name'])) + sys.exit(1) + output_dict[selection_path] = copy.deepcopy(selection) else: print('Excluding selection:', selection_path) + for selection_path in output_dict: + selection = output_dict[selection_path] + subresource_path = \ + spec_json["subresource_path"][selection["subresource"]] + generate_selection(selection, + spec, + subresource_path, + html_template) + def main(target): spec_json = load_spec_json(); diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/a-tag/no-redirect/same-origin-downgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/a-tag/no-redirect/same-origin-downgrade.http.html deleted file mode 100644 index 12903c4da40..00000000000 --- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/a-tag/no-redirect/same-origin-downgrade.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via a-tag using the attr-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "attr-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "a-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/same-origin-downgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/same-origin-downgrade.http.html deleted file mode 100644 index ca0b0b1b5f5..00000000000 --- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/same-origin-downgrade.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via iframe-tag using the attr-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "attr-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/no-redirect/same-origin-downgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/no-redirect/same-origin-downgrade.http.html deleted file mode 100644 index 19cf59322f7..00000000000 --- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/no-redirect/same-origin-downgrade.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via iframe-tag using the attr-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "attr-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-downgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-downgrade.http.html deleted file mode 100644 index 77452623c86..00000000000 --- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-downgrade.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via iframe-tag using the attr-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "attr-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-upgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-upgrade.http.html deleted file mode 100644 index 77452623c86..00000000000 --- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-upgrade.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via iframe-tag using the attr-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "attr-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/keep-origin-redirect/same-origin-downgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/keep-origin-redirect/same-origin-downgrade.http.html deleted file mode 100644 index f0c9e6fd969..00000000000 --- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/keep-origin-redirect/same-origin-downgrade.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via img-tag using the attr-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "attr-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/no-redirect/same-origin-downgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/no-redirect/same-origin-downgrade.http.html deleted file mode 100644 index 2aed178fd08..00000000000 --- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/no-redirect/same-origin-downgrade.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via img-tag using the attr-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "attr-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-downgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-downgrade.http.html deleted file mode 100644 index 4e184519eb8..00000000000 --- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-downgrade.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via img-tag using the attr-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "attr-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-upgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-upgrade.http.html deleted file mode 100644 index 4e184519eb8..00000000000 --- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-upgrade.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via img-tag using the attr-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "attr-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/script-tag/keep-origin-redirect/same-origin-downgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/script-tag/keep-origin-redirect/same-origin-downgrade.http.html deleted file mode 100644 index 9063bbd5ee5..00000000000 --- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/script-tag/keep-origin-redirect/same-origin-downgrade.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via script-tag using the attr-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "attr-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/script-tag/no-redirect/same-origin-downgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/script-tag/no-redirect/same-origin-downgrade.http.html deleted file mode 100644 index 56bc742d64d..00000000000 --- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/script-tag/no-redirect/same-origin-downgrade.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via script-tag using the attr-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "attr-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-downgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-downgrade.http.html deleted file mode 100644 index 3209c5beebf..00000000000 --- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-downgrade.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via script-tag using the attr-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "attr-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-upgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-upgrade.http.html deleted file mode 100644 index 3209c5beebf..00000000000 --- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-upgrade.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via script-tag using the attr-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "attr-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/a-tag/no-redirect/same-origin-downgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/a-tag/no-redirect/same-origin-downgrade.http.html deleted file mode 100644 index 79e75063576..00000000000 --- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/a-tag/no-redirect/same-origin-downgrade.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via a-tag using the http-rp - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "a-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/a-tag/no-redirect/same-origin-downgrade.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/a-tag/no-redirect/same-origin-downgrade.http.html.headers deleted file mode 100644 index 9ce1de38843..00000000000 --- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/a-tag/no-redirect/same-origin-downgrade.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/same-origin-downgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/same-origin-downgrade.http.html deleted file mode 100644 index ee78d6ef1e9..00000000000 --- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/same-origin-downgrade.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via fetch-request using the http-rp - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/same-origin-downgrade.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/same-origin-downgrade.http.html.headers deleted file mode 100644 index 9ce1de38843..00000000000 --- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/keep-origin-redirect/same-origin-downgrade.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/no-redirect/same-origin-downgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/no-redirect/same-origin-downgrade.http.html deleted file mode 100644 index 0019b7d1f33..00000000000 --- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/no-redirect/same-origin-downgrade.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via fetch-request using the http-rp - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/no-redirect/same-origin-downgrade.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/no-redirect/same-origin-downgrade.http.html.headers deleted file mode 100644 index 9ce1de38843..00000000000 --- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/no-redirect/same-origin-downgrade.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-downgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-downgrade.http.html deleted file mode 100644 index f4020bdff8a..00000000000 --- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-downgrade.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via fetch-request using the http-rp - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-downgrade.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-downgrade.http.html.headers deleted file mode 100644 index 9ce1de38843..00000000000 --- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-downgrade.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-upgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-upgrade.http.html deleted file mode 100644 index f4020bdff8a..00000000000 --- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-upgrade.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via fetch-request using the http-rp - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-upgrade.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-upgrade.http.html.headers deleted file mode 100644 index 9ce1de38843..00000000000 --- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-upgrade.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/same-origin-downgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/same-origin-downgrade.http.html deleted file mode 100644 index 48dcc5d522e..00000000000 --- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/same-origin-downgrade.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via iframe-tag using the http-rp - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/same-origin-downgrade.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/same-origin-downgrade.http.html.headers deleted file mode 100644 index 9ce1de38843..00000000000 --- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/keep-origin-redirect/same-origin-downgrade.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/no-redirect/same-origin-downgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/no-redirect/same-origin-downgrade.http.html deleted file mode 100644 index 6cc4669d988..00000000000 --- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/no-redirect/same-origin-downgrade.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via iframe-tag using the http-rp - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/no-redirect/same-origin-downgrade.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/no-redirect/same-origin-downgrade.http.html.headers deleted file mode 100644 index 9ce1de38843..00000000000 --- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/no-redirect/same-origin-downgrade.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-downgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-downgrade.http.html deleted file mode 100644 index b1bacfe9bba..00000000000 --- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-downgrade.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via iframe-tag using the http-rp - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-downgrade.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-downgrade.http.html.headers deleted file mode 100644 index 9ce1de38843..00000000000 --- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-downgrade.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-upgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-upgrade.http.html deleted file mode 100644 index b1bacfe9bba..00000000000 --- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-upgrade.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via iframe-tag using the http-rp - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-upgrade.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-upgrade.http.html.headers deleted file mode 100644 index 9ce1de38843..00000000000 --- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-upgrade.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/same-origin-downgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/same-origin-downgrade.http.html deleted file mode 100644 index 08156b668c4..00000000000 --- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/same-origin-downgrade.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via img-tag using the http-rp - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/same-origin-downgrade.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/same-origin-downgrade.http.html.headers deleted file mode 100644 index 9ce1de38843..00000000000 --- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/keep-origin-redirect/same-origin-downgrade.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/no-redirect/same-origin-downgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/no-redirect/same-origin-downgrade.http.html deleted file mode 100644 index ae1f44978c7..00000000000 --- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/no-redirect/same-origin-downgrade.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via img-tag using the http-rp - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/no-redirect/same-origin-downgrade.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/no-redirect/same-origin-downgrade.http.html.headers deleted file mode 100644 index 9ce1de38843..00000000000 --- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/no-redirect/same-origin-downgrade.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-downgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-downgrade.http.html deleted file mode 100644 index 7b0f9d4b3b7..00000000000 --- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-downgrade.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via img-tag using the http-rp - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-downgrade.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-downgrade.http.html.headers deleted file mode 100644 index 9ce1de38843..00000000000 --- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-downgrade.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-upgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-upgrade.http.html deleted file mode 100644 index 7b0f9d4b3b7..00000000000 --- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-upgrade.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via img-tag using the http-rp - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-upgrade.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-upgrade.http.html.headers deleted file mode 100644 index 9ce1de38843..00000000000 --- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-upgrade.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/same-origin-downgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/same-origin-downgrade.http.html deleted file mode 100644 index 633eb15d97a..00000000000 --- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/same-origin-downgrade.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via script-tag using the http-rp - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/same-origin-downgrade.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/same-origin-downgrade.http.html.headers deleted file mode 100644 index 9ce1de38843..00000000000 --- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/keep-origin-redirect/same-origin-downgrade.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/no-redirect/same-origin-downgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/no-redirect/same-origin-downgrade.http.html deleted file mode 100644 index b7dd2d260b2..00000000000 --- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/no-redirect/same-origin-downgrade.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via script-tag using the http-rp - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/no-redirect/same-origin-downgrade.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/no-redirect/same-origin-downgrade.http.html.headers deleted file mode 100644 index 9ce1de38843..00000000000 --- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/no-redirect/same-origin-downgrade.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-downgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-downgrade.http.html deleted file mode 100644 index d968e31f462..00000000000 --- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-downgrade.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via script-tag using the http-rp - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-downgrade.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-downgrade.http.html.headers deleted file mode 100644 index 9ce1de38843..00000000000 --- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-downgrade.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-upgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-upgrade.http.html deleted file mode 100644 index d968e31f462..00000000000 --- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-upgrade.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via script-tag using the http-rp - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-upgrade.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-upgrade.http.html.headers deleted file mode 100644 index 9ce1de38843..00000000000 --- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-upgrade.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/same-origin-downgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/same-origin-downgrade.http.html deleted file mode 100644 index cde3c4dcb62..00000000000 --- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/same-origin-downgrade.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via xhr-request using the http-rp - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/same-origin-downgrade.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/same-origin-downgrade.http.html.headers deleted file mode 100644 index 9ce1de38843..00000000000 --- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/keep-origin-redirect/same-origin-downgrade.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/no-redirect/same-origin-downgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/no-redirect/same-origin-downgrade.http.html deleted file mode 100644 index 69e0ac3f392..00000000000 --- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/no-redirect/same-origin-downgrade.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via xhr-request using the http-rp - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/no-redirect/same-origin-downgrade.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/no-redirect/same-origin-downgrade.http.html.headers deleted file mode 100644 index 9ce1de38843..00000000000 --- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/no-redirect/same-origin-downgrade.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-downgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-downgrade.http.html deleted file mode 100644 index f9f5cbfc2e0..00000000000 --- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-downgrade.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via xhr-request using the http-rp - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-downgrade.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-downgrade.http.html.headers deleted file mode 100644 index 9ce1de38843..00000000000 --- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-downgrade.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-upgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-upgrade.http.html deleted file mode 100644 index f9f5cbfc2e0..00000000000 --- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-upgrade.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via xhr-request using the http-rp - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-upgrade.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-upgrade.http.html.headers deleted file mode 100644 index 9ce1de38843..00000000000 --- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-upgrade.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/a-tag/no-redirect/same-origin-downgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/a-tag/no-redirect/same-origin-downgrade.http.html deleted file mode 100644 index 2111a0cf7c5..00000000000 --- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/a-tag/no-redirect/same-origin-downgrade.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via a-tag using the meta-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "a-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/keep-origin-redirect/same-origin-downgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/keep-origin-redirect/same-origin-downgrade.http.html deleted file mode 100644 index f0adebf34b3..00000000000 --- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/keep-origin-redirect/same-origin-downgrade.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via fetch-request using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/no-redirect/same-origin-downgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/no-redirect/same-origin-downgrade.http.html deleted file mode 100644 index 4d5714f87f1..00000000000 --- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/no-redirect/same-origin-downgrade.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via fetch-request using the meta-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-downgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-downgrade.http.html deleted file mode 100644 index 6578bd1e631..00000000000 --- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-downgrade.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via fetch-request using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-upgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-upgrade.http.html deleted file mode 100644 index 6578bd1e631..00000000000 --- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/swap-origin-redirect/same-origin-upgrade.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via fetch-request using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/same-origin-downgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/same-origin-downgrade.http.html deleted file mode 100644 index 94802477e7b..00000000000 --- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/keep-origin-redirect/same-origin-downgrade.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via iframe-tag using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/no-redirect/same-origin-downgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/no-redirect/same-origin-downgrade.http.html deleted file mode 100644 index a4298049e50..00000000000 --- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/no-redirect/same-origin-downgrade.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via iframe-tag using the meta-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-downgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-downgrade.http.html deleted file mode 100644 index 548e63ea974..00000000000 --- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-downgrade.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via iframe-tag using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-upgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-upgrade.http.html deleted file mode 100644 index 548e63ea974..00000000000 --- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/swap-origin-redirect/same-origin-upgrade.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via iframe-tag using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/keep-origin-redirect/same-origin-downgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/keep-origin-redirect/same-origin-downgrade.http.html deleted file mode 100644 index 32da6f1eaae..00000000000 --- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/keep-origin-redirect/same-origin-downgrade.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via img-tag using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/no-redirect/same-origin-downgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/no-redirect/same-origin-downgrade.http.html deleted file mode 100644 index c7367f70659..00000000000 --- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/no-redirect/same-origin-downgrade.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via img-tag using the meta-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-downgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-downgrade.http.html deleted file mode 100644 index a0e33c7205f..00000000000 --- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-downgrade.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via img-tag using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-upgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-upgrade.http.html deleted file mode 100644 index a0e33c7205f..00000000000 --- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/swap-origin-redirect/same-origin-upgrade.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via img-tag using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/keep-origin-redirect/same-origin-downgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/keep-origin-redirect/same-origin-downgrade.http.html deleted file mode 100644 index c80a3c7e52f..00000000000 --- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/keep-origin-redirect/same-origin-downgrade.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via script-tag using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/no-redirect/same-origin-downgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/no-redirect/same-origin-downgrade.http.html deleted file mode 100644 index e7e65e19ec6..00000000000 --- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/no-redirect/same-origin-downgrade.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via script-tag using the meta-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-downgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-downgrade.http.html deleted file mode 100644 index 42ecdbc0fd8..00000000000 --- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-downgrade.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via script-tag using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-upgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-upgrade.http.html deleted file mode 100644 index 42ecdbc0fd8..00000000000 --- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/swap-origin-redirect/same-origin-upgrade.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via script-tag using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/keep-origin-redirect/same-origin-downgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/keep-origin-redirect/same-origin-downgrade.http.html deleted file mode 100644 index c6dcc471c47..00000000000 --- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/keep-origin-redirect/same-origin-downgrade.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via xhr-request using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/no-redirect/same-origin-downgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/no-redirect/same-origin-downgrade.http.html deleted file mode 100644 index 53505abe07c..00000000000 --- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/no-redirect/same-origin-downgrade.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via xhr-request using the meta-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-downgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-downgrade.http.html deleted file mode 100644 index 76b1b2df5fa..00000000000 --- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-downgrade.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via xhr-request using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-upgrade.http.html b/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-upgrade.http.html deleted file mode 100644 index 76b1b2df5fa..00000000000 --- a/tests/wpt/web-platform-tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/swap-origin-redirect/same-origin-upgrade.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via xhr-request using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/spec.src.json b/tests/wpt/web-platform-tests/referrer-policy/spec.src.json index f96eaf594e5..97fbad62043 100644 --- a/tests/wpt/web-platform-tests/referrer-policy/spec.src.json +++ b/tests/wpt/web-platform-tests/referrer-policy/spec.src.json @@ -242,8 +242,8 @@ { "name": "same-origin-downgrade", "expansion": "default", - "source_protocol": "http", - "target_protocol": "https", + "source_protocol": "https", + "target_protocol": "http", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "origin": "same-origin", diff --git a/tests/wpt/web-platform-tests/referrer-policy/spec_json.js b/tests/wpt/web-platform-tests/referrer-policy/spec_json.js index 32a32fbc35d..d178c9f2346 100644 --- a/tests/wpt/web-platform-tests/referrer-policy/spec_json.js +++ b/tests/wpt/web-platform-tests/referrer-policy/spec_json.js @@ -1 +1 @@ -var SPEC_JSON = {"subresource_path": {"img-tag": "/referrer-policy/generic/subresource/image.py", "xhr-request": "/referrer-policy/generic/subresource/xhr.py", "fetch-request": "/referrer-policy/generic/subresource/xhr.py", "module-worker": "/referrer-policy/generic/subresource/worker.py", "a-tag": "/referrer-policy/generic/subresource/document.py", "area-tag": "/referrer-policy/generic/subresource/document.py", "iframe-tag": "/referrer-policy/generic/subresource/document.py", "shared-worker": "/referrer-policy/generic/subresource/shared-worker.py", "worker-request": "/referrer-policy/generic/subresource/worker.py", "script-tag": "/referrer-policy/generic/subresource/script.py"}, "test_expansion_schema": {"origin": ["same-origin", "cross-origin"], "subresource": ["iframe-tag", "img-tag", "script-tag", "a-tag", "area-tag", "xhr-request", "worker-request", "module-worker", "shared-worker", "fetch-request"], "target_protocol": ["http", "https"], "expansion": ["default", "override"], "delivery_method": ["http-rp", "meta-referrer", "attr-referrer", "rel-noreferrer"], "redirection": ["no-redirect", "keep-origin-redirect", "swap-origin-redirect"], "referrer_url": ["omitted", "origin", "stripped-referrer"], "source_protocol": ["http", "https"]}, "specification": [{"specification_url": "https://w3c.github.io/webappsec-referrer-policy/#referrer-policies", "referrer_policy": null, "title": "Referrer Policy is not explicitly defined", "test_expansion": [{"origin": "*", "name": "insecure-protocol", "target_protocol": "http", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "stripped-referrer", "source_protocol": "http", "subresource": "*"}, {"origin": "*", "name": "upgrade-protocol", "target_protocol": "https", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "stripped-referrer", "source_protocol": "http", "subresource": "*"}, {"origin": "*", "name": "downgrade-protocol", "target_protocol": "http", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "omitted", "source_protocol": "https", "subresource": "*"}, {"origin": "*", "name": "secure-protocol", "target_protocol": "https", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "stripped-referrer", "source_protocol": "https", "subresource": "*"}], "name": "unset-referrer-policy", "description": "Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."}, {"specification_url": "https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer", "referrer_policy": "no-referrer", "title": "Referrer Policy is set to 'no-referrer'", "test_expansion": [{"origin": "*", "name": "generic", "target_protocol": "*", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "omitted", "source_protocol": "*", "subresource": "*"}], "name": "no-referrer", "description": "Check that sub-resource never gets the referrer URL."}, {"specification_url": "https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade", "referrer_policy": "no-referrer-when-downgrade", "title": "Referrer Policy is set to 'no-referrer-when-downgrade'", "test_expansion": [{"origin": "*", "name": "insecure-protocol", "target_protocol": "http", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "stripped-referrer", "source_protocol": "http", "subresource": "*"}, {"origin": "*", "name": "upgrade-protocol", "target_protocol": "https", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "stripped-referrer", "source_protocol": "http", "subresource": "*"}, {"origin": "*", "name": "downgrade-protocol", "target_protocol": "http", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "omitted", "source_protocol": "https", "subresource": "*"}, {"origin": "*", "name": "secure-protocol", "target_protocol": "https", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "stripped-referrer", "source_protocol": "https", "subresource": "*"}], "name": "no-referrer-when-downgrade", "description": "Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."}, {"specification_url": "https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin", "referrer_policy": "origin", "title": "Referrer Policy is set to 'origin'", "test_expansion": [{"origin": "*", "name": "generic", "target_protocol": "*", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "origin", "source_protocol": "*", "subresource": "*"}], "name": "origin", "description": "Check that all subresources in all casses get only the origin portion of the referrer URL."}, {"specification_url": "https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin", "referrer_policy": "same-origin", "title": "Referrer Policy is set to 'same-origin'", "test_expansion": [{"origin": "same-origin", "name": "same-origin-insecure", "target_protocol": "http", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "stripped-referrer", "source_protocol": "http", "subresource": "*"}, {"origin": "same-origin", "name": "same-origin-secure-default", "target_protocol": "https", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "stripped-referrer", "source_protocol": "https", "subresource": "*"}, {"origin": "same-origin", "name": "same-origin-insecure", "target_protocol": "*", "expansion": "override", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "swap-origin-redirect", "referrer_url": "omitted", "source_protocol": "*", "subresource": "*"}, {"origin": "cross-origin", "name": "cross-origin", "target_protocol": "*", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "omitted", "source_protocol": "*", "subresource": "*"}], "name": "same-origin", "description": "Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."}, {"specification_url": "https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin", "referrer_policy": "origin-when-cross-origin", "title": "Referrer Policy is set to 'origin-when-cross-origin'", "test_expansion": [{"origin": "same-origin", "name": "same-origin-insecure", "target_protocol": "http", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "stripped-referrer", "source_protocol": "http", "subresource": "*"}, {"origin": "same-origin", "name": "same-origin-secure-default", "target_protocol": "https", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "stripped-referrer", "source_protocol": "https", "subresource": "*"}, {"origin": "same-origin", "name": "same-origin-upgrade", "target_protocol": "https", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "origin", "source_protocol": "http", "subresource": "*"}, {"origin": "same-origin", "name": "same-origin-downgrade", "target_protocol": "https", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "origin", "source_protocol": "http", "subresource": "*"}, {"origin": "same-origin", "name": "same-origin-insecure", "target_protocol": "*", "expansion": "override", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "swap-origin-redirect", "referrer_url": "origin", "source_protocol": "*", "subresource": "*"}, {"origin": "cross-origin", "name": "cross-origin", "target_protocol": "*", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "origin", "source_protocol": "*", "subresource": "*"}], "name": "origin-when-cross-origin", "description": "Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."}, {"specification_url": "https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin", "referrer_policy": "strict-origin", "title": "Referrer Policy is set to 'strict-origin'", "test_expansion": [{"origin": "*", "name": "insecure-protocol", "target_protocol": "http", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "origin", "source_protocol": "http", "subresource": "*"}, {"origin": "*", "name": "upgrade-protocol", "target_protocol": "https", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "origin", "source_protocol": "http", "subresource": "*"}, {"origin": "*", "name": "downgrade-protocol", "target_protocol": "http", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "omitted", "source_protocol": "https", "subresource": "*"}, {"origin": "*", "name": "secure-protocol", "target_protocol": "https", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "origin", "source_protocol": "https", "subresource": "*"}], "name": "strict-origin", "description": "Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."}, {"specification_url": "https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin", "referrer_policy": "strict-origin-when-cross-origin", "title": "Referrer Policy is set to 'strict-origin-when-cross-origin'", "test_expansion": [{"origin": "same-origin", "name": "same-insecure", "target_protocol": "http", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "stripped-referrer", "source_protocol": "http", "subresource": "*"}, {"origin": "same-origin", "name": "same-insecure", "target_protocol": "http", "expansion": "override", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "swap-origin-redirect", "referrer_url": "origin", "source_protocol": "http", "subresource": "*"}, {"origin": "cross-origin", "name": "cross-insecure", "target_protocol": "http", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "origin", "source_protocol": "http", "subresource": "*"}, {"origin": "*", "name": "upgrade-protocol", "target_protocol": "https", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "origin", "source_protocol": "http", "subresource": "*"}, {"origin": "*", "name": "downgrade-protocol", "target_protocol": "http", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "omitted", "source_protocol": "https", "subresource": "*"}, {"origin": "same-origin", "name": "same-secure", "target_protocol": "https", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "stripped-referrer", "source_protocol": "https", "subresource": "*"}, {"origin": "same-origin", "name": "same-secure", "target_protocol": "https", "expansion": "override", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "swap-origin-redirect", "referrer_url": "origin", "source_protocol": "https", "subresource": "*"}, {"origin": "cross-origin", "name": "cross-secure", "target_protocol": "https", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "origin", "source_protocol": "https", "subresource": "*"}], "name": "strict-origin-when-cross-origin", "description": "Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."}, {"specification_url": "https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url", "referrer_policy": "unsafe-url", "title": "Referrer Policy is set to 'unsafe-url'", "test_expansion": [{"origin": "*", "name": "generic", "target_protocol": "*", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "stripped-referrer", "source_protocol": "*", "subresource": "*"}], "name": "unsafe-url", "description": "Check that all sub-resources get the stripped referrer URL."}], "referrer_policy_schema": [null, "no-referrer", "no-referrer-when-downgrade", "same-origin", "origin", "origin-when-cross-origin", "strict-origin", "strict-origin-when-cross-origin", "unsafe-url"], "excluded_tests": [{"origin": "cross-origin", "name": "cross-origin-workers", "target_protocol": "*", "expansion": "*", "delivery_method": "*", "redirection": "*", "referrer_url": "*", "source_protocol": "*", "subresource": ["worker-request", "module-worker", "shared-worker"]}, {"origin": "*", "name": "upgraded-protocol-workers", "target_protocol": "https", "expansion": "*", "delivery_method": "*", "redirection": "*", "referrer_url": "*", "source_protocol": "http", "subresource": ["worker-request", "module-worker", "shared-worker"]}, {"origin": "*", "name": "mixed-content-insecure-subresources", "target_protocol": "http", "expansion": "*", "delivery_method": "*", "redirection": "*", "referrer_url": "*", "source_protocol": "https", "subresource": "*"}, {"origin": "*", "name": "elements-not-supporting-attr-referrer", "target_protocol": "*", "expansion": "*", "delivery_method": ["attr-referrer"], "redirection": "*", "referrer_url": "*", "source_protocol": "*", "subresource": ["xhr-request", "worker-request", "module-worker", "shared-worker", "fetch-request"]}, {"origin": "*", "name": "elements-not-supporting-rel-noreferrer", "target_protocol": "*", "expansion": "*", "delivery_method": ["rel-noreferrer"], "redirection": "*", "referrer_url": "*", "source_protocol": "*", "subresource": ["iframe-tag", "img-tag", "script-tag", "xhr-request", "worker-request", "module-worker", "shared-worker", "fetch-request", "area-tag"]}, {"origin": "*", "name": "area-tag", "target_protocol": "*", "expansion": "*", "delivery_method": "*", "redirection": "*", "referrer_url": "*", "source_protocol": "*", "subresource": "area-tag"}, {"origin": "*", "name": "worker-requests-with-swap-origin-redirect", "target_protocol": "*", "expansion": "*", "delivery_method": "*", "redirection": "swap-origin-redirect", "referrer_url": "*", "source_protocol": "*", "subresource": ["worker-request", "module-worker", "shared-worker"]}, {"origin": "*", "name": "overhead-for-redirection", "target_protocol": "*", "expansion": "*", "delivery_method": "*", "redirection": ["keep-origin-redirect", "swap-origin-redirect"], "referrer_url": "*", "source_protocol": "*", "subresource": ["a-tag", "area-tag"]}, {"origin": "*", "name": "source-https-unsupported-by-web-platform-tests-runners", "target_protocol": "*", "expansion": "*", "delivery_method": "*", "redirection": "*", "referrer_url": "*", "source_protocol": "https", "subresource": "*"}]}; +var SPEC_JSON = {"subresource_path": {"img-tag": "/referrer-policy/generic/subresource/image.py", "xhr-request": "/referrer-policy/generic/subresource/xhr.py", "fetch-request": "/referrer-policy/generic/subresource/xhr.py", "module-worker": "/referrer-policy/generic/subresource/worker.py", "a-tag": "/referrer-policy/generic/subresource/document.py", "area-tag": "/referrer-policy/generic/subresource/document.py", "iframe-tag": "/referrer-policy/generic/subresource/document.py", "shared-worker": "/referrer-policy/generic/subresource/shared-worker.py", "worker-request": "/referrer-policy/generic/subresource/worker.py", "script-tag": "/referrer-policy/generic/subresource/script.py"}, "test_expansion_schema": {"origin": ["same-origin", "cross-origin"], "subresource": ["iframe-tag", "img-tag", "script-tag", "a-tag", "area-tag", "xhr-request", "worker-request", "module-worker", "shared-worker", "fetch-request"], "target_protocol": ["http", "https"], "expansion": ["default", "override"], "delivery_method": ["http-rp", "meta-referrer", "attr-referrer", "rel-noreferrer"], "redirection": ["no-redirect", "keep-origin-redirect", "swap-origin-redirect"], "referrer_url": ["omitted", "origin", "stripped-referrer"], "source_protocol": ["http", "https"]}, "specification": [{"specification_url": "https://w3c.github.io/webappsec-referrer-policy/#referrer-policies", "referrer_policy": null, "title": "Referrer Policy is not explicitly defined", "test_expansion": [{"origin": "*", "name": "insecure-protocol", "target_protocol": "http", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "stripped-referrer", "source_protocol": "http", "subresource": "*"}, {"origin": "*", "name": "upgrade-protocol", "target_protocol": "https", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "stripped-referrer", "source_protocol": "http", "subresource": "*"}, {"origin": "*", "name": "downgrade-protocol", "target_protocol": "http", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "omitted", "source_protocol": "https", "subresource": "*"}, {"origin": "*", "name": "secure-protocol", "target_protocol": "https", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "stripped-referrer", "source_protocol": "https", "subresource": "*"}], "name": "unset-referrer-policy", "description": "Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."}, {"specification_url": "https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer", "referrer_policy": "no-referrer", "title": "Referrer Policy is set to 'no-referrer'", "test_expansion": [{"origin": "*", "name": "generic", "target_protocol": "*", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "omitted", "source_protocol": "*", "subresource": "*"}], "name": "no-referrer", "description": "Check that sub-resource never gets the referrer URL."}, {"specification_url": "https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade", "referrer_policy": "no-referrer-when-downgrade", "title": "Referrer Policy is set to 'no-referrer-when-downgrade'", "test_expansion": [{"origin": "*", "name": "insecure-protocol", "target_protocol": "http", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "stripped-referrer", "source_protocol": "http", "subresource": "*"}, {"origin": "*", "name": "upgrade-protocol", "target_protocol": "https", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "stripped-referrer", "source_protocol": "http", "subresource": "*"}, {"origin": "*", "name": "downgrade-protocol", "target_protocol": "http", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "omitted", "source_protocol": "https", "subresource": "*"}, {"origin": "*", "name": "secure-protocol", "target_protocol": "https", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "stripped-referrer", "source_protocol": "https", "subresource": "*"}], "name": "no-referrer-when-downgrade", "description": "Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."}, {"specification_url": "https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin", "referrer_policy": "origin", "title": "Referrer Policy is set to 'origin'", "test_expansion": [{"origin": "*", "name": "generic", "target_protocol": "*", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "origin", "source_protocol": "*", "subresource": "*"}], "name": "origin", "description": "Check that all subresources in all casses get only the origin portion of the referrer URL."}, {"specification_url": "https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin", "referrer_policy": "same-origin", "title": "Referrer Policy is set to 'same-origin'", "test_expansion": [{"origin": "same-origin", "name": "same-origin-insecure", "target_protocol": "http", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "stripped-referrer", "source_protocol": "http", "subresource": "*"}, {"origin": "same-origin", "name": "same-origin-secure-default", "target_protocol": "https", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "stripped-referrer", "source_protocol": "https", "subresource": "*"}, {"origin": "same-origin", "name": "same-origin-insecure", "target_protocol": "*", "expansion": "override", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "swap-origin-redirect", "referrer_url": "omitted", "source_protocol": "*", "subresource": "*"}, {"origin": "cross-origin", "name": "cross-origin", "target_protocol": "*", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "omitted", "source_protocol": "*", "subresource": "*"}], "name": "same-origin", "description": "Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."}, {"specification_url": "https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin", "referrer_policy": "origin-when-cross-origin", "title": "Referrer Policy is set to 'origin-when-cross-origin'", "test_expansion": [{"origin": "same-origin", "name": "same-origin-insecure", "target_protocol": "http", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "stripped-referrer", "source_protocol": "http", "subresource": "*"}, {"origin": "same-origin", "name": "same-origin-secure-default", "target_protocol": "https", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "stripped-referrer", "source_protocol": "https", "subresource": "*"}, {"origin": "same-origin", "name": "same-origin-upgrade", "target_protocol": "https", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "origin", "source_protocol": "http", "subresource": "*"}, {"origin": "same-origin", "name": "same-origin-downgrade", "target_protocol": "http", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "origin", "source_protocol": "https", "subresource": "*"}, {"origin": "same-origin", "name": "same-origin-insecure", "target_protocol": "*", "expansion": "override", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "swap-origin-redirect", "referrer_url": "origin", "source_protocol": "*", "subresource": "*"}, {"origin": "cross-origin", "name": "cross-origin", "target_protocol": "*", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "origin", "source_protocol": "*", "subresource": "*"}], "name": "origin-when-cross-origin", "description": "Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."}, {"specification_url": "https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin", "referrer_policy": "strict-origin", "title": "Referrer Policy is set to 'strict-origin'", "test_expansion": [{"origin": "*", "name": "insecure-protocol", "target_protocol": "http", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "origin", "source_protocol": "http", "subresource": "*"}, {"origin": "*", "name": "upgrade-protocol", "target_protocol": "https", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "origin", "source_protocol": "http", "subresource": "*"}, {"origin": "*", "name": "downgrade-protocol", "target_protocol": "http", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "omitted", "source_protocol": "https", "subresource": "*"}, {"origin": "*", "name": "secure-protocol", "target_protocol": "https", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "origin", "source_protocol": "https", "subresource": "*"}], "name": "strict-origin", "description": "Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."}, {"specification_url": "https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin", "referrer_policy": "strict-origin-when-cross-origin", "title": "Referrer Policy is set to 'strict-origin-when-cross-origin'", "test_expansion": [{"origin": "same-origin", "name": "same-insecure", "target_protocol": "http", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "stripped-referrer", "source_protocol": "http", "subresource": "*"}, {"origin": "same-origin", "name": "same-insecure", "target_protocol": "http", "expansion": "override", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "swap-origin-redirect", "referrer_url": "origin", "source_protocol": "http", "subresource": "*"}, {"origin": "cross-origin", "name": "cross-insecure", "target_protocol": "http", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "origin", "source_protocol": "http", "subresource": "*"}, {"origin": "*", "name": "upgrade-protocol", "target_protocol": "https", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "origin", "source_protocol": "http", "subresource": "*"}, {"origin": "*", "name": "downgrade-protocol", "target_protocol": "http", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "omitted", "source_protocol": "https", "subresource": "*"}, {"origin": "same-origin", "name": "same-secure", "target_protocol": "https", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "stripped-referrer", "source_protocol": "https", "subresource": "*"}, {"origin": "same-origin", "name": "same-secure", "target_protocol": "https", "expansion": "override", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "swap-origin-redirect", "referrer_url": "origin", "source_protocol": "https", "subresource": "*"}, {"origin": "cross-origin", "name": "cross-secure", "target_protocol": "https", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "origin", "source_protocol": "https", "subresource": "*"}], "name": "strict-origin-when-cross-origin", "description": "Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."}, {"specification_url": "https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url", "referrer_policy": "unsafe-url", "title": "Referrer Policy is set to 'unsafe-url'", "test_expansion": [{"origin": "*", "name": "generic", "target_protocol": "*", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "stripped-referrer", "source_protocol": "*", "subresource": "*"}], "name": "unsafe-url", "description": "Check that all sub-resources get the stripped referrer URL."}], "referrer_policy_schema": [null, "no-referrer", "no-referrer-when-downgrade", "same-origin", "origin", "origin-when-cross-origin", "strict-origin", "strict-origin-when-cross-origin", "unsafe-url"], "excluded_tests": [{"origin": "cross-origin", "name": "cross-origin-workers", "target_protocol": "*", "expansion": "*", "delivery_method": "*", "redirection": "*", "referrer_url": "*", "source_protocol": "*", "subresource": ["worker-request", "module-worker", "shared-worker"]}, {"origin": "*", "name": "upgraded-protocol-workers", "target_protocol": "https", "expansion": "*", "delivery_method": "*", "redirection": "*", "referrer_url": "*", "source_protocol": "http", "subresource": ["worker-request", "module-worker", "shared-worker"]}, {"origin": "*", "name": "mixed-content-insecure-subresources", "target_protocol": "http", "expansion": "*", "delivery_method": "*", "redirection": "*", "referrer_url": "*", "source_protocol": "https", "subresource": "*"}, {"origin": "*", "name": "elements-not-supporting-attr-referrer", "target_protocol": "*", "expansion": "*", "delivery_method": ["attr-referrer"], "redirection": "*", "referrer_url": "*", "source_protocol": "*", "subresource": ["xhr-request", "worker-request", "module-worker", "shared-worker", "fetch-request"]}, {"origin": "*", "name": "elements-not-supporting-rel-noreferrer", "target_protocol": "*", "expansion": "*", "delivery_method": ["rel-noreferrer"], "redirection": "*", "referrer_url": "*", "source_protocol": "*", "subresource": ["iframe-tag", "img-tag", "script-tag", "xhr-request", "worker-request", "module-worker", "shared-worker", "fetch-request", "area-tag"]}, {"origin": "*", "name": "area-tag", "target_protocol": "*", "expansion": "*", "delivery_method": "*", "redirection": "*", "referrer_url": "*", "source_protocol": "*", "subresource": "area-tag"}, {"origin": "*", "name": "worker-requests-with-swap-origin-redirect", "target_protocol": "*", "expansion": "*", "delivery_method": "*", "redirection": "swap-origin-redirect", "referrer_url": "*", "source_protocol": "*", "subresource": ["worker-request", "module-worker", "shared-worker"]}, {"origin": "*", "name": "overhead-for-redirection", "target_protocol": "*", "expansion": "*", "delivery_method": "*", "redirection": ["keep-origin-redirect", "swap-origin-redirect"], "referrer_url": "*", "source_protocol": "*", "subresource": ["a-tag", "area-tag"]}, {"origin": "*", "name": "source-https-unsupported-by-web-platform-tests-runners", "target_protocol": "*", "expansion": "*", "delivery_method": "*", "redirection": "*", "referrer_url": "*", "source_protocol": "https", "subresource": "*"}]}; diff --git a/tests/wpt/web-platform-tests/shadow-dom/offsetParent-across-shadow-boundaries.html b/tests/wpt/web-platform-tests/shadow-dom/offsetParent-across-shadow-boundaries.html new file mode 100644 index 00000000000..5491e212133 --- /dev/null +++ b/tests/wpt/web-platform-tests/shadow-dom/offsetParent-across-shadow-boundaries.html @@ -0,0 +1,190 @@ +<!DOCTYPE html> +<html> +<head> +<meta name="author" title="Ryosuke Niwa" href="mailto:rniwa@webkit.org"> +<meta name="assert" content="offsetParent should only return nodes that are shadow including ancestor"> +<link rel="help" href="https://drafts.csswg.org/cssom-view/#dom-htmlelement-offsetparent"> +<link rel="help" href="https://dom.spec.whatwg.org/#concept-shadow-including-inclusive-ancestor"> +<script src="/resources/testharness.js"></script> +<script src="/resources/testharnessreport.js"></script> +<script src="resources/event-path-test-helpers.js"></script> +</head> +<body> +<div id="log"></div> +<div id="container" style="position: relative"></div> +<script> + +const container = document.getElementById('container'); + +function testOffsetParentInShadowTree(mode) { + test(function () { + const host = document.createElement('div'); + container.appendChild(host); + this.add_cleanup(() => host.remove()); + const shadowRoot = host.attachShadow({mode}); + shadowRoot.innerHTML = '<div id="relativeParent" style="position: relative; padding-left: 100px; padding-top: 70px;"><div id="target"></div></div>'; + const relativeParent = shadowRoot.getElementById('relativeParent'); + + assert_true(relativeParent instanceof HTMLDivElement); + const target = shadowRoot.getElementById('target'); + assert_equals(target.offsetParent, relativeParent); + assert_equals(target.offsetLeft, 100); + assert_equals(target.offsetTop, 70); + }, `offsetParent must return the offset parent in the same shadow tree of ${mode} mode`); +} + +testOffsetParentInShadowTree('open'); +testOffsetParentInShadowTree('closed'); + +function testOffsetParentInNestedShadowTrees(mode) { + test(function () { + const outerHost = document.createElement('section'); + container.appendChild(outerHost); + this.add_cleanup(() => outerHost.remove()); + const outerShadow = outerHost.attachShadow({mode}); + outerShadow.innerHTML = '<section id="outerParent" style="position: absolute; top: 50px; left: 50px;"></section>'; + + const innerHost = document.createElement('div'); + outerShadow.firstChild.appendChild(innerHost); + const innerShadow = innerHost.attachShadow({mode}); + innerShadow.innerHTML = '<div id="innerParent" style="position: relative; padding-left: 60px; padding-top: 40px;"><div id="target"></div></div>'; + const innerParent = innerShadow.getElementById('innerParent'); + + const target = innerShadow.getElementById('target'); + assert_true(innerParent instanceof HTMLDivElement); + assert_equals(target.offsetParent, innerParent); + assert_equals(target.offsetLeft, 60); + assert_equals(target.offsetTop, 40); + + outerHost.remove(); + }, `offsetParent must return the offset parent in the same shadow tree of ${mode} mode even when nested`); +} + +testOffsetParentInNestedShadowTrees('open'); +testOffsetParentInNestedShadowTrees('closed'); + +function testOffsetParentOnElementAssignedToSlotInsideOffsetParent(mode) { + test(function () { + const host = document.createElement('div'); + host.innerHTML = '<div id="target"></div>' + container.appendChild(host); + this.add_cleanup(() => host.remove()); + const shadowRoot = host.attachShadow({mode}); + shadowRoot.innerHTML = '<div style="position: relative; padding-left: 85px; padding-top: 45px;"><slot></slot></div>'; + const target = host.querySelector('#target'); + assert_equals(target.offsetParent, container); + assert_equals(target.offsetLeft, 85); + assert_equals(target.offsetTop, 45); + }, `offsetParent must skip offset parents of an element when the context object is assigned to a slot in a shadow tree of ${mode} mode`); +} + +testOffsetParentOnElementAssignedToSlotInsideOffsetParent('open'); +testOffsetParentOnElementAssignedToSlotInsideOffsetParent('closed'); + +function testOffsetParentOnElementAssignedToSlotInsideNestedOffsetParents(mode) { + test(function () { + const host = document.createElement('div'); + host.innerHTML = '<div id="target" style="border:solid 1px blue;">hi</div>'; + const previousBlock = document.createElement('div'); + previousBlock.style.height = '12px'; + container.append(previousBlock, host); + this.add_cleanup(() => { container.innerHTML = ''; }); + const shadowRoot = host.attachShadow({mode}); + shadowRoot.innerHTML = '<section style="position: relative; margin-left: 20px; margin-top: 100px; background: #ccc"><div style="position: absolute; top: 10px; left: 10px;"><slot></slot></div></section>'; + const target = host.querySelector('#target'); + assert_equals(target.offsetParent, container); + assert_equals(target.offsetLeft, 30); + assert_equals(target.offsetTop, 122); + }, `offsetParent must skip multiple offset parents of an element when the context object is assigned to a slot in a shadow tree of ${mode} mode`); +} + +testOffsetParentOnElementAssignedToSlotInsideNestedOffsetParents('open'); +testOffsetParentOnElementAssignedToSlotInsideNestedOffsetParents('closed'); + +function testOffsetParentOnElementAssignedToSlotInsideNestedShadowTrees(mode) { + test(function () { + const outerHost = document.createElement('section'); + outerHost.innerHTML = '<div id="target"></div>'; + container.appendChild(outerHost); + this.add_cleanup(() => outerHost.remove()); + const outerShadow = outerHost.attachShadow({mode}); + outerShadow.innerHTML = '<section style="position: absolute; top: 40px; left: 50px;"><div id="innerHost"><slot></slot></div></section>'; + + const innerShadow = outerShadow.getElementById('innerHost').attachShadow({mode}); + innerShadow.innerHTML = '<div style="position: absolute; top: 200px; margin-left: 100px;"><slot></slot></div>'; + + const target = outerHost.querySelector('#target'); + assert_equals(target.offsetParent, container); + assert_equals(target.offsetLeft, 150); + assert_equals(target.offsetTop, 240); + outerHost.remove(); + }, `offsetParent must skip offset parents of an element when the context object is assigned to a slot in nested shadow trees of ${mode} mode`); +} + +testOffsetParentOnElementAssignedToSlotInsideNestedShadowTrees('open'); +testOffsetParentOnElementAssignedToSlotInsideNestedShadowTrees('closed'); + +function testOffsetParentOnElementInsideShadowTreeWithoutOffsetParent(mode) { + test(function () { + const outerHost = document.createElement('section'); + container.appendChild(outerHost); + this.add_cleanup(() => outerHost.remove()); + const outerShadow = outerHost.attachShadow({mode}); + outerShadow.innerHTML = '<div id="innerHost"><div id="target"></div></div>'; + + const innerShadow = outerShadow.getElementById('innerHost').attachShadow({mode}); + innerShadow.innerHTML = '<div style="position: absolute; top: 23px; left: 24px;"><slot></slot></div>'; + + const target = outerShadow.querySelector('#target'); + assert_equals(target.offsetParent, container); + assert_equals(target.offsetLeft, 24); + assert_equals(target.offsetTop, 23); + }, `offsetParent must find the first offset parent which is a shadow-including ancestor of the context object even some shadow tree of ${mode} mode did not have any offset parent`); +} + +testOffsetParentOnElementInsideShadowTreeWithoutOffsetParent('open'); +testOffsetParentOnElementInsideShadowTreeWithoutOffsetParent('closed'); + +function testOffsetParentOnUnassignedChild(mode) { + test(function () { + const host = document.createElement('section'); + host.innerHTML = '<div id="target"></div>'; + this.add_cleanup(() => host.remove()); + container.appendChild(host); + const shadowRoot = host.attachShadow({mode}); + shadowRoot.innerHTML = '<section style="position: absolute; top: 50px; left: 50px;">content</section>'; + const target = host.querySelector('#target'); + assert_equals(target.offsetParent, null); + assert_equals(target.offsetLeft, 0); + assert_equals(target.offsetTop, 0); + }, `offsetParent must return null on a child element of a shadow host for the shadow tree in ${mode} mode which is not assigned to any slot`); +} + +testOffsetParentOnUnassignedChild('open'); +testOffsetParentOnUnassignedChild('closed'); + +function testOffsetParentOnAssignedChildNotInFlatTree(mode) { + test(function () { + const outerHost = document.createElement('section'); + outerHost.innerHTML = '<div id="target"></div>'; + container.appendChild(outerHost); + this.add_cleanup(() => outerHost.remove()); + const outerShadow = outerHost.attachShadow({mode}); + outerShadow.innerHTML = '<div id="innerHost"><div style="position: absolute; top: 50px; left: 50px;"><slot></slot></div></div>'; + + const innerShadow = outerShadow.getElementById('innerHost').attachShadow({mode}); + innerShadow.innerHTML = '<div>content</div>'; + + const target = outerHost.querySelector('#target'); + assert_equals(target.offsetParent, null); + assert_equals(target.offsetLeft, 0); + assert_equals(target.offsetTop, 0); + }, `offsetParent must return null on a child element of a shadow host for the shadow tree in ${mode} mode which is not in the flat tree`); +} + +testOffsetParentOnAssignedChildNotInFlatTree('open'); +testOffsetParentOnAssignedChildNotInFlatTree('closed'); + +</script> +</body> +</html> diff --git a/tests/wpt/web-platform-tests/signed-exchange/check-cert-request.tentative.html b/tests/wpt/web-platform-tests/signed-exchange/check-cert-request.tentative.html new file mode 100644 index 00000000000..5a89066c012 --- /dev/null +++ b/tests/wpt/web-platform-tests/signed-exchange/check-cert-request.tentative.html @@ -0,0 +1,17 @@ +<!DOCTYPE html> +<title>Verify that certificate request has correct parameters.</title> +<script src="/resources/testharness.js"></script> +<script src="/resources/testharnessreport.js"></script> +<script src="/common/get-host-info.sub.js"></script> +<script src="./resources/sxg-util.js"></script> +<body> +<script> +promise_test(async (t) => { + const sxgUrl = get_host_info().HTTPS_ORIGIN + '/signed-exchange/resources/check-cert-request.sxg'; + const message = await openSXGInIframeAndWaitForMessage(t, sxgUrl); + assert_equals(message.location, innerURLOrigin() + '/signed-exchange/resources/inner-url.html'); + assert_false(message.is_fallback); +}, 'Verify that certificate request has correct parameters.'); + +</script> +</body> diff --git a/tests/wpt/web-platform-tests/signed-exchange/resources/check-cert-request.py b/tests/wpt/web-platform-tests/signed-exchange/resources/check-cert-request.py new file mode 100644 index 00000000000..ce95f0699eb --- /dev/null +++ b/tests/wpt/web-platform-tests/signed-exchange/resources/check-cert-request.py @@ -0,0 +1,11 @@ +import os + +def main(request, response): + CertChainMimeType = "application/cert-chain+cbor" + + if request.headers.get("Accept") != CertChainMimeType: + return 400, [], "Bad Request" + + path = os.path.join(os.path.dirname(__file__), "127.0.0.1.sxg.pem.cbor") + body = open(path, "rb").read() + return 200, [("Content-Type", CertChainMimeType)], body diff --git a/tests/wpt/web-platform-tests/signed-exchange/resources/check-cert-request.sxg b/tests/wpt/web-platform-tests/signed-exchange/resources/check-cert-request.sxg Binary files differnew file mode 100644 index 00000000000..05f1646cfeb --- /dev/null +++ b/tests/wpt/web-platform-tests/signed-exchange/resources/check-cert-request.sxg diff --git a/tests/wpt/web-platform-tests/signed-exchange/resources/check-cert-request.sxg.headers b/tests/wpt/web-platform-tests/signed-exchange/resources/check-cert-request.sxg.headers new file mode 100644 index 00000000000..ca41178420c --- /dev/null +++ b/tests/wpt/web-platform-tests/signed-exchange/resources/check-cert-request.sxg.headers @@ -0,0 +1,2 @@ +Content-Type: application/signed-exchange;v=b2 +X-Content-Type-Options: nosniff diff --git a/tests/wpt/web-platform-tests/signed-exchange/resources/generate-test-sxgs.sh b/tests/wpt/web-platform-tests/signed-exchange/resources/generate-test-sxgs.sh index a31ce6810d3..8359a137b8f 100755 --- a/tests/wpt/web-platform-tests/signed-exchange/resources/generate-test-sxgs.sh +++ b/tests/wpt/web-platform-tests/signed-exchange/resources/generate-test-sxgs.sh @@ -38,6 +38,21 @@ gen-signedexchange \ -o sxg-location.sxg \ -miRecordSize 100 +# For check-cert-request.tentative.html +gen-signedexchange \ + -version 1b2 \ + -uri $inner_url_origin/signed-exchange/resources/inner-url.html \ + -status 200 \ + -content sxg-location.html \ + -certificate $certfile \ + -certUrl $cert_url_origin/signed-exchange/resources/check-cert-request.py \ + -validityUrl $inner_url_origin/signed-exchange/resources/resource.validity.msg \ + -privateKey $keyfile \ + -date 2018-04-01T00:00:00Z \ + -expire 168h \ + -o check-cert-request.sxg \ + -miRecordSize 100 + # Request method is HEAD. gen-signedexchange \ -version 1b2 \ @@ -148,4 +163,20 @@ gen-signedexchange \ -o sxg-inner-url-bom.sxg \ -miRecordSize 100 +# Response has Cache-Control: no-store header. +gen-signedexchange \ + -version 1b2 \ + -uri $inner_url_origin/signed-exchange/resources/inner-url.html \ + -status 200 \ + -responseHeader "Cache-Control: no-store" \ + -content sxg-location.html \ + -certificate $certfile \ + -certUrl $cert_url_origin/signed-exchange/resources/$certfile.cbor \ + -validityUrl $inner_url_origin/signed-exchange/resources/resource.validity.msg \ + -privateKey $keyfile \ + -date 2018-04-01T00:00:00Z \ + -expire 168h \ + -o sxg-noncacheable.sxg \ + -miRecordSize 100 + rm -fr $tmpdir diff --git a/tests/wpt/web-platform-tests/signed-exchange/resources/sxg-noncacheable.sxg b/tests/wpt/web-platform-tests/signed-exchange/resources/sxg-noncacheable.sxg Binary files differnew file mode 100644 index 00000000000..38be1eeb3aa --- /dev/null +++ b/tests/wpt/web-platform-tests/signed-exchange/resources/sxg-noncacheable.sxg diff --git a/tests/wpt/web-platform-tests/signed-exchange/resources/sxg-noncacheable.sxg.headers b/tests/wpt/web-platform-tests/signed-exchange/resources/sxg-noncacheable.sxg.headers new file mode 100644 index 00000000000..ca41178420c --- /dev/null +++ b/tests/wpt/web-platform-tests/signed-exchange/resources/sxg-noncacheable.sxg.headers @@ -0,0 +1,2 @@ +Content-Type: application/signed-exchange;v=b2 +X-Content-Type-Options: nosniff diff --git a/tests/wpt/web-platform-tests/signed-exchange/sxg-noncacheable.tentative.html b/tests/wpt/web-platform-tests/signed-exchange/sxg-noncacheable.tentative.html new file mode 100644 index 00000000000..82c9fb0d029 --- /dev/null +++ b/tests/wpt/web-platform-tests/signed-exchange/sxg-noncacheable.tentative.html @@ -0,0 +1,17 @@ +<!DOCTYPE html> +<title>Loading SignedHTTPExchange with non-cacheable response must fail</title> +<script src="/resources/testharness.js"></script> +<script src="/resources/testharnessreport.js"></script> +<script src="/common/get-host-info.sub.js"></script> +<script src="./resources/sxg-util.js"></script> +<body> +<script> +promise_test(async (t) => { + const sxgUrl = get_host_info().HTTPS_ORIGIN + '/signed-exchange/resources/sxg-noncacheable.sxg'; + const message = await openSXGInIframeAndWaitForMessage(t, sxgUrl); + assert_equals(message.location, innerURLOrigin() + '/signed-exchange/resources/inner-url.html'); + assert_true(message.is_fallback); +}, 'Loading SignedHTTPExchange with non-cacheable response must fail'); + +</script> +</body> diff --git a/tests/wpt/web-platform-tests/tools/wptrunner/wptrunner/executors/executormarionette.py b/tests/wpt/web-platform-tests/tools/wptrunner/wptrunner/executors/executormarionette.py index d471b4ed660..d69e998e2c3 100644 --- a/tests/wpt/web-platform-tests/tools/wptrunner/wptrunner/executors/executormarionette.py +++ b/tests/wpt/web-platform-tests/tools/wptrunner/wptrunner/executors/executormarionette.py @@ -158,10 +158,9 @@ class MarionetteTestharnessProtocolPart(TestharnessProtocolPart): for handle in handles: try: - self.dismiss_alert(lambda: self.marionette.switch_to_window(handle)) - self.marionette.switch_to_window(handle) self.logger.info("Closing window %s" % handle) - self.marionette.close() + self.marionette.switch_to_window(handle) + self.dismiss_alert(lambda: self.marionette.close()) except errors.NoSuchWindowException: # We might have raced with the previous test to close this # window, skip it. diff --git a/tests/wpt/web-platform-tests/upgrade-insecure-requests/support/testharness-helper.sub.js b/tests/wpt/web-platform-tests/upgrade-insecure-requests/support/testharness-helper.sub.js index 383506a1437..8bf576c2abd 100644 --- a/tests/wpt/web-platform-tests/upgrade-insecure-requests/support/testharness-helper.sub.js +++ b/tests/wpt/web-platform-tests/upgrade-insecure-requests/support/testharness-helper.sub.js @@ -39,7 +39,7 @@ function generateURL(host, protocol, resourceType) { } function generateRedirect(host, protocol, target) { - var url = "http://{{host}}:{{ports[https][0]}}/common/redirect.py?location=" + encodeURIComponent(target.url); + var url = new URL("http://{{host}}:{{ports[https][0]}}/common/redirect.py?location=" + encodeURIComponent(target.url)); url.protocol = protocol == Protocol.INSECURE ? "http" : "https"; url.hostname = host == Host.SAME_ORIGIN ? "{{host}}" : "{{domains[天気の良い日]}}"; return { diff --git a/tests/wpt/web-platform-tests/web-animations/animation-model/animation-types/property-types.js b/tests/wpt/web-platform-tests/web-animations/animation-model/animation-types/property-types.js index 9382c6297b9..64a7eb47627 100644 --- a/tests/wpt/web-platform-tests/web-animations/animation-model/animation-types/property-types.js +++ b/tests/wpt/web-platform-tests/web-animations/animation-model/animation-types/property-types.js @@ -1885,7 +1885,7 @@ const translateListType = { 1000 ); testAnimationSamples(animation, idlName, - [{ time: 500, expected: '200px calc(25% - 50.5px) 200px' }]); + [{ time: 500, expected: 'calc(0% + 200px) calc(25% - 50.5px) 200px' }]); }, `${property} with combination of percentages and lengths`); }, testAddition: function(property, setup) { diff --git a/tests/wpt/web-platform-tests/webrtc/RTCDtlsTransport-state.html b/tests/wpt/web-platform-tests/webrtc/RTCDtlsTransport-state.html index 283ab087f70..fd7215fa4e1 100644 --- a/tests/wpt/web-platform-tests/webrtc/RTCDtlsTransport-state.html +++ b/tests/wpt/web-platform-tests/webrtc/RTCDtlsTransport-state.html @@ -42,16 +42,54 @@ function resolveWhen(t, dtlstransport, state) { }); } -promise_test(async t => { +// Helper class to exchange ice candidates between +// two local peer connections +class CandidateChannel { + constructor(source, dest) { + source.addEventListener('icecandidate', event => { + const { candidate } = event; + if (candidate && this.activated + && this.destination.signalingState !== 'closed') { + this.destination.addIceCandidate(candidate); + } else { + this.queue.push(candidate); + } + }); + this.destination = dest; + this.activated = false; + this.queue = []; + } + activate() { + this.activated = true; + for (const candidate of this.queue) { + this.destination.addIceCandidate(candidate); + } + } +} + +function coupleCandidates(pc1, pc2) { + const ch1 = new CandidateChannel(pc1, pc2); + const ch2 = new CandidateChannel(pc2, pc1); + return [ch1, ch2]; +} + +async function setupConnections(t) { const pc1 = new RTCPeerConnection(); t.add_cleanup(() => pc1.close()); const pc2 = new RTCPeerConnection(); t.add_cleanup(() => pc2.close()); pc1.addTrack(trackFactories.audio()); - exchangeIceCandidates(pc1, pc2); - + const channels = coupleCandidates(pc1, pc2); await doSignalingHandshake(pc1, pc2); + for (const channel of channels) { + channel.activate(); + } + return [pc1, pc2]; +} + +promise_test(async t => { + const [pc1, pc2] = await setupConnections(t); const dtlsTransport1 = pc1.getTransceivers()[0].sender.transport; const dtlsTransport2 = pc2.getTransceivers()[0].sender.transport; assert_true(dtlsTransport1 instanceof RTCDtlsTransport); @@ -61,15 +99,8 @@ promise_test(async t => { }, 'DTLS transport goes to connected state'); promise_test(async t => { - const pc1 = new RTCPeerConnection(); - t.add_cleanup(() => pc1.close()); - const pc2 = new RTCPeerConnection(); - t.add_cleanup(() => pc2.close()); - - pc1.addTrack(trackFactories.audio()); - exchangeIceCandidates(pc1, pc2); + const [pc1, pc2] = await setupConnections(t); - await doSignalingHandshake(pc1, pc2); const dtlsTransport1 = pc1.getTransceivers()[0].sender.transport; const dtlsTransport2 = pc2.getTransceivers()[0].sender.transport; await Promise.all([resolveWhen(t, dtlsTransport1, 'connected'), @@ -79,15 +110,7 @@ promise_test(async t => { }, 'close() causes the local transport to close immediately'); promise_test(async t => { - const pc1 = new RTCPeerConnection(); - t.add_cleanup(() => pc1.close()); - const pc2 = new RTCPeerConnection(); - t.add_cleanup(() => pc2.close()); - - pc1.addTrack(trackFactories.audio()); - exchangeIceCandidates(pc1, pc2); - - await doSignalingHandshake(pc1, pc2); + const [pc1, pc2] = await setupConnections(t); const dtlsTransport1 = pc1.getTransceivers()[0].sender.transport; const dtlsTransport2 = pc2.getTransceivers()[0].sender.transport; await Promise.all([resolveWhen(t, dtlsTransport1, 'connected'), |