aboutsummaryrefslogtreecommitdiffstats
path: root/tests/wpt/meta/content-security-policy/embedded-enforcement
diff options
context:
space:
mode:
authorTim van der Lippe <TimvdLippe@users.noreply.github.com>2025-04-17 23:11:25 +0200
committerGitHub <noreply@github.com>2025-04-17 21:11:25 +0000
commit2a81987590622feabd1beedb3c7cc87d6a88c85a (patch)
tree1615f7c11bcbeeab8c43dad58c3980a7e072d32e /tests/wpt/meta/content-security-policy/embedded-enforcement
parent70b3e248168f1277e282a269bd1bf754fa7b784c (diff)
downloadservo-2a81987590622feabd1beedb3c7cc87d6a88c85a.tar.gz
servo-2a81987590622feabd1beedb3c7cc87d6a88c85a.zip
Check CSP for inline event handlers (#36510)
This also ensures that document now reports all violations and we set the correct directive. With these changes, all `script-src-attr-elem` WPT tests pass. Part of #36437 Requires servo/rust-content-security-policy#3 to land first Signed-off-by: Tim van der Lippe <tvanderlippe@gmail.com>
Diffstat (limited to 'tests/wpt/meta/content-security-policy/embedded-enforcement')
-rw-r--r--tests/wpt/meta/content-security-policy/embedded-enforcement/allow_csp_from-header.html.ini25
-rw-r--r--tests/wpt/meta/content-security-policy/embedded-enforcement/blocked-iframe-are-cross-origin.html.ini6
-rw-r--r--tests/wpt/meta/content-security-policy/embedded-enforcement/change-csp-attribute-and-history-navigation.html.ini6
-rw-r--r--tests/wpt/meta/content-security-policy/embedded-enforcement/idlharness.window.js.ini6
-rw-r--r--tests/wpt/meta/content-security-policy/embedded-enforcement/iframe-csp-attribute.html.ini12
-rw-r--r--tests/wpt/meta/content-security-policy/embedded-enforcement/required-csp-header-cascade.html.ini27
-rw-r--r--tests/wpt/meta/content-security-policy/embedded-enforcement/required_csp-header.html.ini141
-rw-r--r--tests/wpt/meta/content-security-policy/embedded-enforcement/subsumption_algorithm-general.html.ini21
-rw-r--r--tests/wpt/meta/content-security-policy/embedded-enforcement/subsumption_algorithm-hashes.html.ini18
-rw-r--r--tests/wpt/meta/content-security-policy/embedded-enforcement/subsumption_algorithm-host_sources-hosts.html.ini12
-rw-r--r--tests/wpt/meta/content-security-policy/embedded-enforcement/subsumption_algorithm-host_sources-paths.html.ini9
-rw-r--r--tests/wpt/meta/content-security-policy/embedded-enforcement/subsumption_algorithm-host_sources-ports.html.ini12
-rw-r--r--tests/wpt/meta/content-security-policy/embedded-enforcement/subsumption_algorithm-host_sources-protocols.html.ini12
-rw-r--r--tests/wpt/meta/content-security-policy/embedded-enforcement/subsumption_algorithm-nonces.html.ini9
-rw-r--r--tests/wpt/meta/content-security-policy/embedded-enforcement/subsumption_algorithm-none.html.ini21
-rw-r--r--tests/wpt/meta/content-security-policy/embedded-enforcement/subsumption_algorithm-self.html.ini6
-rw-r--r--tests/wpt/meta/content-security-policy/embedded-enforcement/subsumption_algorithm-source_list-wildcards.html.ini45
-rw-r--r--tests/wpt/meta/content-security-policy/embedded-enforcement/subsumption_algorithm-strict_dynamic.html.ini9
-rw-r--r--tests/wpt/meta/content-security-policy/embedded-enforcement/subsumption_algorithm-unsafe_eval.html.ini12
-rw-r--r--tests/wpt/meta/content-security-policy/embedded-enforcement/subsumption_algorithm-unsafe_hashes.html.ini12
-rw-r--r--tests/wpt/meta/content-security-policy/embedded-enforcement/subsumption_algorithm-unsafe_inline.html.ini18
21 files changed, 0 insertions, 439 deletions
diff --git a/tests/wpt/meta/content-security-policy/embedded-enforcement/allow_csp_from-header.html.ini b/tests/wpt/meta/content-security-policy/embedded-enforcement/allow_csp_from-header.html.ini
deleted file mode 100644
index 3cf8d56a5d6..00000000000
--- a/tests/wpt/meta/content-security-policy/embedded-enforcement/allow_csp_from-header.html.ini
+++ /dev/null
@@ -1,25 +0,0 @@
-[allow_csp_from-header.html]
- expected: TIMEOUT
- [Same origin iframes with an empty Allow-CSP-From header get blocked.]
- expected: FAIL
-
- [Same origin iframes without Allow-CSP-From header gets blocked.]
- expected: FAIL
-
- [Same origin iframes are blocked if Allow-CSP-From does not match origin.]
- expected: FAIL
-
- [Cross origin iframe with an empty Allow-CSP-From header gets blocked.]
- expected: FAIL
-
- [Cross origin iframe without Allow-CSP-From header gets blocked.]
- expected: FAIL
-
- [Iframe with improper Allow-CSP-From header gets blocked.]
- expected: FAIL
-
- [Star Allow-CSP-From header enforces EmbeddingCSP.]
- expected: TIMEOUT
-
- [Allow-CSP-From header enforces EmbeddingCSP.]
- expected: TIMEOUT
diff --git a/tests/wpt/meta/content-security-policy/embedded-enforcement/blocked-iframe-are-cross-origin.html.ini b/tests/wpt/meta/content-security-policy/embedded-enforcement/blocked-iframe-are-cross-origin.html.ini
deleted file mode 100644
index 31c147a6ece..00000000000
--- a/tests/wpt/meta/content-security-policy/embedded-enforcement/blocked-iframe-are-cross-origin.html.ini
+++ /dev/null
@@ -1,6 +0,0 @@
-[blocked-iframe-are-cross-origin.html]
- [Document blocked by embedded enforcement and its parent are cross-origin]
- expected: FAIL
-
- [Two same-origin iframes must appear as cross-origin when one is blocked]
- expected: FAIL
diff --git a/tests/wpt/meta/content-security-policy/embedded-enforcement/change-csp-attribute-and-history-navigation.html.ini b/tests/wpt/meta/content-security-policy/embedded-enforcement/change-csp-attribute-and-history-navigation.html.ini
deleted file mode 100644
index c8205878128..00000000000
--- a/tests/wpt/meta/content-security-policy/embedded-enforcement/change-csp-attribute-and-history-navigation.html.ini
+++ /dev/null
@@ -1,6 +0,0 @@
-[change-csp-attribute-and-history-navigation.html]
- [Iframe csp attribute changed before history navigation of local scheme.]
- expected: FAIL
-
- [Iframe csp attribute changed before history navigation of network scheme.]
- expected: FAIL
diff --git a/tests/wpt/meta/content-security-policy/embedded-enforcement/idlharness.window.js.ini b/tests/wpt/meta/content-security-policy/embedded-enforcement/idlharness.window.js.ini
deleted file mode 100644
index 551c76a0058..00000000000
--- a/tests/wpt/meta/content-security-policy/embedded-enforcement/idlharness.window.js.ini
+++ /dev/null
@@ -1,6 +0,0 @@
-[idlharness.window.html]
- [HTMLIFrameElement interface: attribute csp]
- expected: FAIL
-
- [HTMLIFrameElement interface: document.createElement("iframe") must inherit property "csp" with the proper type]
- expected: FAIL
diff --git a/tests/wpt/meta/content-security-policy/embedded-enforcement/iframe-csp-attribute.html.ini b/tests/wpt/meta/content-security-policy/embedded-enforcement/iframe-csp-attribute.html.ini
deleted file mode 100644
index 000df37abc1..00000000000
--- a/tests/wpt/meta/content-security-policy/embedded-enforcement/iframe-csp-attribute.html.ini
+++ /dev/null
@@ -1,12 +0,0 @@
-[iframe-csp-attribute.html]
- [<iframe> has a 'csp' attibute which is an empty string if undefined.]
- expected: FAIL
-
- [<iframe>'s csp attribute is always a string.]
- expected: FAIL
-
- [<iframe>'s 'csp content attribute reflects the IDL attribute.]
- expected: FAIL
-
- [<iframe>'s IDL attribute reflects the DOM attribute.]
- expected: FAIL
diff --git a/tests/wpt/meta/content-security-policy/embedded-enforcement/required-csp-header-cascade.html.ini b/tests/wpt/meta/content-security-policy/embedded-enforcement/required-csp-header-cascade.html.ini
deleted file mode 100644
index 19ac0a5a7e6..00000000000
--- a/tests/wpt/meta/content-security-policy/embedded-enforcement/required-csp-header-cascade.html.ini
+++ /dev/null
@@ -1,27 +0,0 @@
-[required-csp-header-cascade.html]
- [Test same origin: Test same policy for both iframes]
- expected: FAIL
-
- [Test same origin: Test more restrictive policy on second iframe]
- expected: FAIL
-
- [Test same origin: Test less restrictive policy on second iframe]
- expected: FAIL
-
- [Test same origin: Test no policy on second iframe]
- expected: FAIL
-
- [Test same origin: Test no policy on first iframe]
- expected: FAIL
-
- [Test same origin: Test invalid policy on first iframe (bad directive name)]
- expected: FAIL
-
- [Test same origin: Test invalid policy on first iframe (report directive)]
- expected: FAIL
-
- [Test same origin: Test invalid policy on second iframe (bad directive name)]
- expected: FAIL
-
- [Test same origin: Test invalid policy on second iframe (report directive)]
- expected: FAIL
diff --git a/tests/wpt/meta/content-security-policy/embedded-enforcement/required_csp-header.html.ini b/tests/wpt/meta/content-security-policy/embedded-enforcement/required_csp-header.html.ini
deleted file mode 100644
index 784d7df63b8..00000000000
--- a/tests/wpt/meta/content-security-policy/embedded-enforcement/required_csp-header.html.ini
+++ /dev/null
@@ -1,141 +0,0 @@
-[required_csp-header.html]
- [Test Required-CSP value on `csp` change: Sec-Required-CSP is not sent if `csp` attribute is not set on <iframe>.]
- expected: FAIL
-
- [Test same origin: Send Sec-Required-CSP when `csp` attribute of <iframe> is not empty.]
- expected: FAIL
-
- [Test same origin redirect: Send Sec-Required-CSP when `csp` attribute of <iframe> is not empty.]
- expected: FAIL
-
- [Test cross origin redirect: Send Sec-Required-CSP when `csp` attribute of <iframe> is not empty.]
- expected: FAIL
-
- [Test cross origin redirect of cross origin iframe: Send Sec-Required-CSP when `csp` attribute of <iframe> is not empty.]
- expected: FAIL
-
- [Test Required-CSP value on `csp` change: Send Sec-Required-CSP when `csp` attribute of <iframe> is not empty.]
- expected: FAIL
-
- [Test same origin: Send Sec-Required-CSP Header on change of `src` attribute on iframe.]
- expected: FAIL
-
- [Test same origin redirect: Send Sec-Required-CSP Header on change of `src` attribute on iframe.]
- expected: FAIL
-
- [Test cross origin redirect: Send Sec-Required-CSP Header on change of `src` attribute on iframe.]
- expected: FAIL
-
- [Test cross origin redirect of cross origin iframe: Send Sec-Required-CSP Header on change of `src` attribute on iframe.]
- expected: FAIL
-
- [Test Required-CSP value on `csp` change: Send Sec-Required-CSP Header on change of `src` attribute on iframe.]
- expected: FAIL
-
- [Test same origin: Wrong but allowed value of `csp` should still trigger sending Sec-Required-CSP Header - gibberish csp]
- expected: FAIL
-
- [Test same origin redirect: Wrong but allowed value of `csp` should still trigger sending Sec-Required-CSP Header - gibberish csp]
- expected: FAIL
-
- [Test cross origin redirect: Wrong but allowed value of `csp` should still trigger sending Sec-Required-CSP Header - gibberish csp]
- expected: FAIL
-
- [Test cross origin redirect of cross origin iframe: Wrong but allowed value of `csp` should still trigger sending Sec-Required-CSP Header - gibberish csp]
- expected: FAIL
-
- [Test Required-CSP value on `csp` change: Wrong but allowed value of `csp` should still trigger sending Sec-Required-CSP Header - gibberish csp]
- expected: FAIL
-
- [Test same origin: Wrong but allowed value of `csp` should still trigger sending Sec-Required-CSP Header - unknown policy name]
- expected: FAIL
-
- [Test same origin redirect: Wrong but allowed value of `csp` should still trigger sending Sec-Required-CSP Header - unknown policy name]
- expected: FAIL
-
- [Test cross origin redirect: Wrong but allowed value of `csp` should still trigger sending Sec-Required-CSP Header - unknown policy name]
- expected: FAIL
-
- [Test cross origin redirect of cross origin iframe: Wrong but allowed value of `csp` should still trigger sending Sec-Required-CSP Header - unknown policy name]
- expected: FAIL
-
- [Test Required-CSP value on `csp` change: Wrong but allowed value of `csp` should still trigger sending Sec-Required-CSP Header - unknown policy name]
- expected: FAIL
-
- [Test same origin: Wrong but allowed value of `csp` should still trigger sending Sec-Required-CSP Header - unknown policy name in multiple directives]
- expected: FAIL
-
- [Test same origin redirect: Wrong but allowed value of `csp` should still trigger sending Sec-Required-CSP Header - unknown policy name in multiple directives]
- expected: FAIL
-
- [Test cross origin redirect: Wrong but allowed value of `csp` should still trigger sending Sec-Required-CSP Header - unknown policy name in multiple directives]
- expected: FAIL
-
- [Test cross origin redirect of cross origin iframe: Wrong but allowed value of `csp` should still trigger sending Sec-Required-CSP Header - unknown policy name in multiple directives]
- expected: FAIL
-
- [Test Required-CSP value on `csp` change: Wrong but allowed value of `csp` should still trigger sending Sec-Required-CSP Header - unknown policy name in multiple directives]
- expected: FAIL
-
- [Test same origin: Wrong but allowed value of `csp` should still trigger sending Sec-Required-CSP Header - misspeled 'none']
- expected: FAIL
-
- [Test same origin redirect: Wrong but allowed value of `csp` should still trigger sending Sec-Required-CSP Header - misspeled 'none']
- expected: FAIL
-
- [Test cross origin redirect: Wrong but allowed value of `csp` should still trigger sending Sec-Required-CSP Header - misspeled 'none']
- expected: FAIL
-
- [Test cross origin redirect of cross origin iframe: Wrong but allowed value of `csp` should still trigger sending Sec-Required-CSP Header - misspeled 'none']
- expected: FAIL
-
- [Test Required-CSP value on `csp` change: Wrong but allowed value of `csp` should still trigger sending Sec-Required-CSP Header - misspeled 'none']
- expected: FAIL
-
- [Test same origin: Wrong but allowed value of `csp` should still trigger sending Sec-Required-CSP Header - query values in path]
- expected: FAIL
-
- [Test same origin redirect: Wrong but allowed value of `csp` should still trigger sending Sec-Required-CSP Header - query values in path]
- expected: FAIL
-
- [Test cross origin redirect: Wrong but allowed value of `csp` should still trigger sending Sec-Required-CSP Header - query values in path]
- expected: FAIL
-
- [Test cross origin redirect of cross origin iframe: Wrong but allowed value of `csp` should still trigger sending Sec-Required-CSP Header - query values in path]
- expected: FAIL
-
- [Test Required-CSP value on `csp` change: Wrong but allowed value of `csp` should still trigger sending Sec-Required-CSP Header - query values in path]
- expected: FAIL
-
- [Test same origin: Wrong but allowed value of `csp` should still trigger sending Sec-Required-CSP Header - missing semicolon]
- expected: FAIL
-
- [Test same origin redirect: Wrong but allowed value of `csp` should still trigger sending Sec-Required-CSP Header - missing semicolon]
- expected: FAIL
-
- [Test cross origin redirect: Wrong but allowed value of `csp` should still trigger sending Sec-Required-CSP Header - missing semicolon]
- expected: FAIL
-
- [Test cross origin redirect of cross origin iframe: Wrong but allowed value of `csp` should still trigger sending Sec-Required-CSP Header - missing semicolon]
- expected: FAIL
-
- [Test Required-CSP value on `csp` change: Wrong but allowed value of `csp` should still trigger sending Sec-Required-CSP Header - missing semicolon]
- expected: FAIL
-
- [Test Required-CSP value on `csp` change: Wrong and dangerous value of `csp` should not trigger sending Sec-Required-CSP Header - comma separated]
- expected: FAIL
-
- [Test Required-CSP value on `csp` change: Wrong and dangerous value of `csp` should not trigger sending Sec-Required-CSP Header - invalid characters in directive names]
- expected: FAIL
-
- [Test Required-CSP value on `csp` change: Wrong and dangerous value of `csp` should not trigger sending Sec-Required-CSP Header - invalid character in directive name]
- expected: FAIL
-
- [Test Required-CSP value on `csp` change: Wrong and dangerous value of `csp` should not trigger sending Sec-Required-CSP Header - report-uri present]
- expected: FAIL
-
- [Test Required-CSP value on `csp` change: Wrong and dangerous value of `csp` should not trigger sending Sec-Required-CSP Header - report-to present]
- expected: FAIL
-
- [Test Required-CSP value on `csp` change: Sec-Required-CSP is not sent if `csp` attribute is longer than 4096 bytes]
- expected: FAIL
diff --git a/tests/wpt/meta/content-security-policy/embedded-enforcement/subsumption_algorithm-general.html.ini b/tests/wpt/meta/content-security-policy/embedded-enforcement/subsumption_algorithm-general.html.ini
deleted file mode 100644
index 17be9612c26..00000000000
--- a/tests/wpt/meta/content-security-policy/embedded-enforcement/subsumption_algorithm-general.html.ini
+++ /dev/null
@@ -1,21 +0,0 @@
-[subsumption_algorithm-general.html]
- [Iframe with empty returned CSP should be blocked.]
- expected: FAIL
-
- [Iframe with less restricting CSP should be blocked.]
- expected: FAIL
-
- [Iframe with a different CSP should be blocked.]
- expected: FAIL
-
- [Host wildcard *.a.com does not match a.com]
- expected: FAIL
-
- [Iframe should block if intersection allows sources which are not in required_csp.]
- expected: FAIL
-
- [Iframe should block if intersection allows sources which are not in required_csp (other ordering).]
- expected: FAIL
-
- [Removed plugin-types directive should be ignored 3.]
- expected: FAIL
diff --git a/tests/wpt/meta/content-security-policy/embedded-enforcement/subsumption_algorithm-hashes.html.ini b/tests/wpt/meta/content-security-policy/embedded-enforcement/subsumption_algorithm-hashes.html.ini
deleted file mode 100644
index 52a06599411..00000000000
--- a/tests/wpt/meta/content-security-policy/embedded-enforcement/subsumption_algorithm-hashes.html.ini
+++ /dev/null
@@ -1,18 +0,0 @@
-[subsumption_algorithm-hashes.html]
- [Returned should not include hashes not present in required csp.]
- expected: FAIL
-
- [Hashes do not have to be present in returned csp but must not allow all inline behavior.]
- expected: FAIL
-
- [Other expressions have to be subsumed.]
- expected: FAIL
-
- [Required csp must allow 'sha256-abc123'.]
- expected: FAIL
-
- [Effective policy is properly found where 'sha256-abc123' is not subsumed.]
- expected: FAIL
-
- ['sha256-abc123' is not subsumed by 'sha256-abc456'.]
- expected: FAIL
diff --git a/tests/wpt/meta/content-security-policy/embedded-enforcement/subsumption_algorithm-host_sources-hosts.html.ini b/tests/wpt/meta/content-security-policy/embedded-enforcement/subsumption_algorithm-host_sources-hosts.html.ini
deleted file mode 100644
index d45034b98bb..00000000000
--- a/tests/wpt/meta/content-security-policy/embedded-enforcement/subsumption_algorithm-host_sources-hosts.html.ini
+++ /dev/null
@@ -1,12 +0,0 @@
-[subsumption_algorithm-host_sources-hosts.html]
- [Host must match.]
- expected: FAIL
-
- [Hosts without wildcards must match.]
- expected: FAIL
-
- [More specific subdomain should not match.]
- expected: FAIL
-
- [Specified host should not match a wildcard host.]
- expected: FAIL
diff --git a/tests/wpt/meta/content-security-policy/embedded-enforcement/subsumption_algorithm-host_sources-paths.html.ini b/tests/wpt/meta/content-security-policy/embedded-enforcement/subsumption_algorithm-host_sources-paths.html.ini
deleted file mode 100644
index a209654a16a..00000000000
--- a/tests/wpt/meta/content-security-policy/embedded-enforcement/subsumption_algorithm-host_sources-paths.html.ini
+++ /dev/null
@@ -1,9 +0,0 @@
-[subsumption_algorithm-host_sources-paths.html]
- [Returned CSP must specify a path.]
- expected: FAIL
-
- [Empty path is not subsumed by specified paths.]
- expected: FAIL
-
- [That should not be true when required csp specifies a specific page.]
- expected: FAIL
diff --git a/tests/wpt/meta/content-security-policy/embedded-enforcement/subsumption_algorithm-host_sources-ports.html.ini b/tests/wpt/meta/content-security-policy/embedded-enforcement/subsumption_algorithm-host_sources-ports.html.ini
deleted file mode 100644
index 71eee1cc3a6..00000000000
--- a/tests/wpt/meta/content-security-policy/embedded-enforcement/subsumption_algorithm-host_sources-ports.html.ini
+++ /dev/null
@@ -1,12 +0,0 @@
-[subsumption_algorithm-host_sources-ports.html]
- [Specified ports must match.]
- expected: FAIL
-
- [Returned CSP should be subsumed if the port is specified but is not default for a more secure scheme.]
- expected: FAIL
-
- [Wildcard port should not be subsumed by a default port.]
- expected: FAIL
-
- [Wildcard port should not be subsumed by a spcified port.]
- expected: FAIL
diff --git a/tests/wpt/meta/content-security-policy/embedded-enforcement/subsumption_algorithm-host_sources-protocols.html.ini b/tests/wpt/meta/content-security-policy/embedded-enforcement/subsumption_algorithm-host_sources-protocols.html.ini
deleted file mode 100644
index 7667e7f2f15..00000000000
--- a/tests/wpt/meta/content-security-policy/embedded-enforcement/subsumption_algorithm-host_sources-protocols.html.ini
+++ /dev/null
@@ -1,12 +0,0 @@
-[subsumption_algorithm-host_sources-protocols.html]
- [`https` is more restrictive than `http`.]
- expected: FAIL
-
- [`http:` does not subsume other protocols.]
- expected: FAIL
-
- [If scheme source is present in returned csp, it must be specified in required csp too.]
- expected: FAIL
-
- [All scheme sources must be subsumed.]
- expected: FAIL
diff --git a/tests/wpt/meta/content-security-policy/embedded-enforcement/subsumption_algorithm-nonces.html.ini b/tests/wpt/meta/content-security-policy/embedded-enforcement/subsumption_algorithm-nonces.html.ini
deleted file mode 100644
index beac34a684b..00000000000
--- a/tests/wpt/meta/content-security-policy/embedded-enforcement/subsumption_algorithm-nonces.html.ini
+++ /dev/null
@@ -1,9 +0,0 @@
-[subsumption_algorithm-nonces.html]
- [A nonce has to be returned if required by the embedder.]
- expected: FAIL
-
- [Nonce intersection is still done on exact match - matching nonces.]
- expected: FAIL
-
- [Other expressions still have to be subsumed - negative test]
- expected: FAIL
diff --git a/tests/wpt/meta/content-security-policy/embedded-enforcement/subsumption_algorithm-none.html.ini b/tests/wpt/meta/content-security-policy/embedded-enforcement/subsumption_algorithm-none.html.ini
deleted file mode 100644
index 32ef4ddd0df..00000000000
--- a/tests/wpt/meta/content-security-policy/embedded-enforcement/subsumption_algorithm-none.html.ini
+++ /dev/null
@@ -1,21 +0,0 @@
-[subsumption_algorithm-none.html]
- [Required policy that allows `none` does not subsume empty list of policies.]
- expected: FAIL
-
- [Required csp with effective `none` does not subsume a host source expression.]
- expected: FAIL
-
- [Required csp with `none` does not subsume a host source expression.]
- expected: FAIL
-
- [Required csp with effective `none` does not subsume `none` of another directive.]
- expected: FAIL
-
- [Required csp with `none` does not subsume `none` of another directive.]
- expected: FAIL
-
- [Required csp with `none` does not subsume `none` of different directives.]
- expected: FAIL
-
- [Both required and returned csp are `none` for only one directive.]
- expected: FAIL
diff --git a/tests/wpt/meta/content-security-policy/embedded-enforcement/subsumption_algorithm-self.html.ini b/tests/wpt/meta/content-security-policy/embedded-enforcement/subsumption_algorithm-self.html.ini
deleted file mode 100644
index 6fc6208a3db..00000000000
--- a/tests/wpt/meta/content-security-policy/embedded-enforcement/subsumption_algorithm-self.html.ini
+++ /dev/null
@@ -1,6 +0,0 @@
-[subsumption_algorithm-self.html]
- [Returned CSP must not allow 'self' if required CSP does not.]
- expected: FAIL
-
- [Returned 'self' should not be subsumed by a more secure version of origin's url.]
- expected: FAIL
diff --git a/tests/wpt/meta/content-security-policy/embedded-enforcement/subsumption_algorithm-source_list-wildcards.html.ini b/tests/wpt/meta/content-security-policy/embedded-enforcement/subsumption_algorithm-source_list-wildcards.html.ini
deleted file mode 100644
index bb05e009d9e..00000000000
--- a/tests/wpt/meta/content-security-policy/embedded-enforcement/subsumption_algorithm-source_list-wildcards.html.ini
+++ /dev/null
@@ -1,45 +0,0 @@
-[subsumption_algorithm-source_list-wildcards.html]
- [Wildcard does not subsume empty list.]
- expected: FAIL
-
- [Empty source list does not subsume a wildcard source list.]
- expected: FAIL
-
- ['none' does not subsume a wildcard source list.]
- expected: FAIL
-
- [Wildcard source list does not subsume `data:` scheme source expression.]
- expected: FAIL
-
- [Wildcard source list does not subsume `blob:` scheme source expression.]
- expected: FAIL
-
- [Source expressions do not subsume effective nonce expressions.]
- expected: FAIL
-
- [Wildcard source list is not subsumed by a host expression.]
- expected: FAIL
-
- [Wildcard list with keywords is not subsumed by a wildcard list.]
- expected: FAIL
-
- [Wildcard list with 'unsafe-hashes' is not subsumed by a wildcard list.]
- expected: FAIL
-
- [Wildcard list with 'unsafe-inline' is not subsumed by a wildcard list.]
- expected: FAIL
-
- [Wildcard list with 'unsafe-eval' is not subsumed by a wildcard list.]
- expected: FAIL
-
- [Wildcard list with 'unsafe-eval' is not subsumed by list with a single expression.]
- expected: FAIL
-
- [The same as above but for 'unsafe-inline'.]
- expected: FAIL
-
- [`data:` is not subsumed by a wildcard list.]
- expected: FAIL
-
- [`blob:` is not subsumed by a wildcard list.]
- expected: FAIL
diff --git a/tests/wpt/meta/content-security-policy/embedded-enforcement/subsumption_algorithm-strict_dynamic.html.ini b/tests/wpt/meta/content-security-policy/embedded-enforcement/subsumption_algorithm-strict_dynamic.html.ini
deleted file mode 100644
index 1ac21eb5c3f..00000000000
--- a/tests/wpt/meta/content-security-policy/embedded-enforcement/subsumption_algorithm-strict_dynamic.html.ini
+++ /dev/null
@@ -1,9 +0,0 @@
-[subsumption_algorithm-strict_dynamic.html]
- ['strict-dynamic' is effective only for `script-src`.]
- expected: FAIL
-
- ['strict-dynamic' is properly handled for finding effective policy.]
- expected: FAIL
-
- ['strict-dynamic' has to be allowed by required csp if it is present in returned csp.]
- expected: FAIL
diff --git a/tests/wpt/meta/content-security-policy/embedded-enforcement/subsumption_algorithm-unsafe_eval.html.ini b/tests/wpt/meta/content-security-policy/embedded-enforcement/subsumption_algorithm-unsafe_eval.html.ini
deleted file mode 100644
index e5f8147c981..00000000000
--- a/tests/wpt/meta/content-security-policy/embedded-enforcement/subsumption_algorithm-unsafe_eval.html.ini
+++ /dev/null
@@ -1,12 +0,0 @@
-[subsumption_algorithm-unsafe_eval.html]
- [No other keyword has the same effect as 'unsafe-eval'.]
- expected: FAIL
-
- [Other expressions have to be subsumed.]
- expected: FAIL
-
- [Required csp must allow 'unsafe-eval'.]
- expected: FAIL
-
- [Effective policy is properly found where 'unsafe-eval' is not subsumed.]
- expected: FAIL
diff --git a/tests/wpt/meta/content-security-policy/embedded-enforcement/subsumption_algorithm-unsafe_hashes.html.ini b/tests/wpt/meta/content-security-policy/embedded-enforcement/subsumption_algorithm-unsafe_hashes.html.ini
deleted file mode 100644
index be8fe1e17a1..00000000000
--- a/tests/wpt/meta/content-security-policy/embedded-enforcement/subsumption_algorithm-unsafe_hashes.html.ini
+++ /dev/null
@@ -1,12 +0,0 @@
-[subsumption_algorithm-unsafe_hashes.html]
- [No other keyword has the same effect as 'unsafe-hashes'.]
- expected: FAIL
-
- [Other expressions have to be subsumed.]
- expected: FAIL
-
- [Required csp must allow 'unsafe-hashes'.]
- expected: FAIL
-
- [Effective policy is properly found where 'unsafe-hashes' is not subsumed.]
- expected: FAIL
diff --git a/tests/wpt/meta/content-security-policy/embedded-enforcement/subsumption_algorithm-unsafe_inline.html.ini b/tests/wpt/meta/content-security-policy/embedded-enforcement/subsumption_algorithm-unsafe_inline.html.ini
deleted file mode 100644
index 7921da71005..00000000000
--- a/tests/wpt/meta/content-security-policy/embedded-enforcement/subsumption_algorithm-unsafe_inline.html.ini
+++ /dev/null
@@ -1,18 +0,0 @@
-[subsumption_algorithm-unsafe_inline.html?9-last]
- [Required csp allows `strict-dynamic`, but retuned csp does.]
- expected: FAIL
-
- [Required csp does not allow `unsafe-inline`, but retuned csp does.]
- expected: FAIL
-
- [Returned csp allows a nonce.]
- expected: FAIL
-
- [Returned csp allows a hash.]
- expected: FAIL
-
- [Effective returned csp allows 'unsafe-inline']
- expected: FAIL
-
-
-[subsumption_algorithm-unsafe_inline.html?1-8]